452 Patterns: Implementing Self-Service in an SOA Environment
transaction security, sometimes referred to as attach-time or transaction-attach
security. The next level of security is
resource security and applies to
CICS-controlled resources such as programs, files, or queues used by the
transaction.
Within an application, further authorization can be controlled by CICS. The CICS
system programming command can be protected by the facilities of
command
security
, and the issuing of requests on an interconnected CICS system can be
controlled using intercommunication security. Lastly,
surrogate user security can
also be used to authorize an authenticated user to perform actions on behalf of a
different user.
For more details on CICS security, refer to the publication Securing Web Access
to CICS, SG24-5756.
12.7 For more information
For more information, see:
򐂰 WebSphere Application Server Version 6.0 Information Center, available at:
http://publib.boulder.ibm.com/infocenter/ws60help/index.jsp
򐂰 J2EE Connector Architecture Specification Version 1.5
http://java.sun.com/j2ee/connector/
򐂰 WebSphere Application Server V6 System Management and Configuration
Handbook, SG24-6451
򐂰 Patterns: Self-Service Application Solutions Using WebSphere V5.0,
SG24-6591

Get Patterns: Implementing Self-Service in an SOA Environment now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.