Propagating security credentials to CICS Transaction Server for z/OS
The CICSRequest node can use an
identity that is present in the Properties folder of the message tree
structure for the security credentials in a request, by using the Propagate property on the security
profile that is defined on the node.
If a CICSRequest node is configured
with a security profile, it extracts security tokens from the input
message at run time, and propagates an identity to CICS®.
To propagate an identity to be used for the CICS request security credentials,
complete the following steps.
- Ensure that an appropriate security profile exists for
the CICSRequest node, or
create a security profile, by following the instructions in Creating a security profile.
- Use the Broker Archive editor to select a security profile
for the CICSRequest node
that has identity propagation enabled. For detailed instructions,
see Configuring a message flow for identity propagation.