WebSphere Message Broker, Version 8.0.0.7 Operating Systems: AIX, HP-Itanium, Linux, Solaris, Windows, z/OS

See information about the latest product version

Propagating security credentials to CICS Transaction Server for z/OS

The CICSRequest node can use an identity that is present in the Properties folder of the message tree structure for the security credentials in a request, by using the Propagate property on the security profile that is defined on the node.

If a CICSRequest node is configured with a security profile, it extracts security tokens from the input message at run time, and propagates an identity to CICS®.

To propagate an identity to be used for the CICS request security credentials, complete the following steps.

  1. Ensure that an appropriate security profile exists for the CICSRequest node, or create a security profile, by following the instructions in Creating a security profile.
  2. Use the Broker Archive editor to select a security profile for the CICSRequest node that has identity propagation enabled. For detailed instructions, see Configuring a message flow for identity propagation.
Notices | Trademarks | Downloads | Library | Support | Feedback

Copyright IBM Corporation 1999, 2016Copyright IBM Corporation 1999, 2016.

        
        Last updated:
        
        Last updated: 2016-05-23 14:47:49


Task topicTask topic | Version 8.0.0.7 | bc22660_