Configuring distributed identity propagation
Follow these steps to configure the propagation of distributed identities over IPIC connections to CICS® for user authorization.
Before you begin
- Configure an IPCONN definition in CICS with
USERAUTH=IDENTIFY
. Also set the IPCONN attributes LINKAUTH and SECNAME appropriately. For more information, see Configuring an IPIC connection in CICS. - Configure a
zosconnect_cicsIpicConnection
element in the configuration file. For more information, see Configuring an IPIC connection in IBM z/OS Connect. - If IBM z/OS Connect is not on z/OS or is not in the same sysplex as the target CICS region, you must use an IPIC TLS connection to CICS that is configured with client authentication. For more information, Configuring TLS on an IPIC connection.
About this task
z/OS is configured to authenticate the LDAP distributed
identity by updating the configuration file to enable authentication and define an LDAP user
registry. As CICS retrieves the mapped SAF user IDs from
distributed identities for user authorization, there is no need to map the distributed identity to a
SAF user ID in IBM z/OS Connect. No change to the
zosconnect_cicsIpicConnection
element is required.
Procedure
Results
The distinguished name and realm information can also be recorded to SMF in type 110, subtype 01 records. For more information, see Identity class data. The identity monitoring data values of interest are MNI_ID_USERID, which contains the mapped SAF user ID, and the MNI_ENTRY_FIELD, which contains the distinguished name and realm. These fields are described in Identity class data: Listing of data fields and MNI - Transaction identity monitoring data. CICS Transaction Server provides a sample program to print monitoring data, called DFH$MOLS. For more information, see Sample monitoring data print program (DFH$MOLS).