Service management team
Posted by: Service management team <smt...@xs4all.nl>
we're setting up a SQLHost/DB2 for CICS environment using TCP/IP and
wonder how the verification requests are done from the listener program
It seems there is some security checking for the userid and the
There is nothing in the documentation about this security checking.
We also wonder why we need an exit (EZACICSE) for the security checking
when this function is supported from the GTILSN program?
Hope someone can help us,
Thanks in advance, Paul Jansen
Posted by: Tony Vinayak <tony.v...@worldnet.att.net>
Here's some info from Patricia, our SQLHost expert:
The exit is only needed for versions 3.x of CICS since the task needed to be
terminal attached in order to be able to invoke security. In CICS 4.1 this
is not the case and so the exit is not absolutely required, although it is
advisable in a highly concurrent environment because IBM does not support
reuse of DB2 threads for non-terminal attached tasks. For earlier versions
of CICS they are not supported by IBM so I won't go into them.
Centura Professional Services
Who is online
Users browsing this forum: [Ccbot] and 0 guests