WebSphere Message Broker, Version 8.0.0.7
Operating Systems: AIX, HP-Itanium, Linux, Solaris, Windows, z/OS
See information about the latest product version
See information about the latest product version
Propagating security credentials to CICS Transaction Server for z/OS
The CICSRequest node can use an identity that is present in the Properties folder of the message tree structure for the security credentials in a request, by using the Propagate property on the security profile that is defined on the node.
If a CICSRequest node is configured
with a security profile, it extracts security tokens from the input
message at run time, and propagates an identity to CICS®.
To propagate an identity to be used for the CICS request security credentials, complete the following steps.
- Ensure that an appropriate security profile exists for the CICSRequest node, or create a security profile, by following the instructions in Creating a security profile.
- Use the Broker Archive editor to select a security profile for the CICSRequest node that has identity propagation enabled. For detailed instructions, see Configuring a message flow for identity propagation.