Propagating security credentials to CICS Transaction Server for z/OS
The CICSRequest node can use an identity that is present in the Properties folder of the message tree structure for the security credentials in a request, by using the Propagate property on the security profile that is defined on the node.
About this task
Procedure
To propagate an identity to be used for the CICS request security credentials, complete the following steps.
- Ensure that an appropriate security profile exists for the CICSRequest node, or create a security profile, by following the instructions in Creating a security profile.
- Use the BAR editor to select a security profile
for the CICSRequest node
that has identity propagation enabled. For detailed instructions, see Configuring a message flow for identity propagation.