Java APIs

Java APIs make EIM available to z/OS applications and servers written in Java. If your location uses programs written in Java and you wish to incorporate these EIM into these programs, you'll be able to use the Java EIM APIs to interface with EIM. Some benefits of this include:
  • The ability to write EIM administrative and lookup applications in Java
  • z/OS qualities of service in the Java-enabled APIs, specifically:
    1. Auditors can begin to track work requests as they are processed by their &eserver_logo; systems. Activity by the user IDs on different platforms may be traced back to the enterprise identifier
    2. Applications can use RACF profiles to store bind credentials (bind DNs and passwords) instead of less secure practices such as hard coding the values in their programs, defining side files to store the information, or creating yet another application unique mechanism for managing bind credentials
    3. Applications can use RACF profiles to store the registry names instead of hard coding them in the programs, or store them in configuration files with application unique tools for managing the information. RACF allows the stored registry names to be shared among all applications on the system.
  • Support Kerberos and CRAM-MD5 authentication mechanisms through the JNI provider
  • Use existing system identities and the new distributed technologies interchangeably
  • Administrators will have a central repository for saving relationships between enterprise identifiers and user IDs. As EIM based administration applications become available and operating systems exploit EIM, creation and deletion of user IDs can be tied to identifiers in an EIM domain
  • The combination of EIM and LDAP eliminates the need for creating new user identities and the software to manage them. EIM and LDAP can replace the need for costly infrastructure to distribute identities to different platforms
  • The ability to transform identities to local representations across operating systems and use existing system authorization mechanisms to validate access to system resources.