Security for IPIC (IP interconnectivity)

IPIC is the way that CICS® Transaction Server for z/OS® provides intersystem communication over TCP/IP. IPIC connections can be used in many scenarios: for example, to connect CICS to CICS, CICS to IMS, CICS to CICS TX on Cloud or TXSeries®, and clients to CICS across TCP/IP networks. For more information about the architecture of IPIC connections, see Intercommunication using IP interconnectivity. IPIC connections provide a comprehensive set of security controls for both transport security and CICS user authentication.

For information about securing MRO connections and some additional IPIC information, see Security for MRO.

When you decide how to secure IPIC connections, you need to consider the standard security principles: authentication, identification, authorization, integrity, confidentiality, and audit. For a description of these terms, see What does security mean in CICS?