Propagating security credentials to CICS Transaction Server for z/OS

The CICSRequest node can use an identity that is present in the Properties folder of the message tree structure for the security credentials in a request, by using the Propagate property on the security profile that is defined on the node.

About this task

If a CICSRequest node is configured with a security profile, it extracts security tokens from the input message at run time, and propagates an identity to CICS®.

Procedure

To propagate an identity to be used for the CICS request security credentials, complete the following steps.

  1. Ensure that an appropriate security profile exists for the CICSRequest node, or create a security profile, by following the instructions in Creating a security profile.
  2. Use the BAR editor to select a security profile for the CICSRequest node that has identity propagation enabled.