SHARE in Seattle

16544: Why Shouldn't I Be Able To Open This Queue? MQ and CICS Security Topics

Friday, March 6, 2015: 8:30 AM-9:30 AM
Willow B (Level 2) (Sheraton Seattle)
Speaker: Lyn Elkins(IBM Corporation)
  • MQ and CICS security (783.7 kB)
  • My auditors have asked how we are securing the CICS transactions that are started via MQ messages.  And right now I cannot tell them,,,'errrr, they are not, because we expected security to be done at the front end.'  We've found out that the front end security we were promised disappeared into the reality of "it is hard to do that."  And we, the responsible admins, are not quite sure what to do next.  What ID's can the transactions run under?  Are there differences whether the transaction is started with a triggered MQ message? What kind of authentication can MQ do these days?  How do I secure the queues?

    Tracks: CICS Systems Programming, Middleware, Security and Compliance and Security in the Enterprise
    Share |

    See more of Project: CICS
    See more of Program: Application Architecture Development