User authentication using SSL client certificates

You can optionally use client certificates with SSL to allow the server to authenticate the client during the SSL handshake.

A client certificate can be used with or without another authentication mechanism such as a user ID and password. When a client certificate has been authenticated it can be made available on each ECI and web service request, and can be used by the Gateway daemon to authorize the request. This is achieved by mapping the certificate to an External Security Manager (ESM) user ID.

To enable the Gateway daemon to retrieve a user ID associated with a client certificate, client authentication must be enabled on the SSL or HTTPS protocol handler in the Gateway daemon using the clientauth=esmuserid property. To run the CICS® transaction under the ESM user ID which has been mapped to the client certificate, ensure that the CICS connection has been defined with Attachsec set to Identify.

To map a certificate to a RACF® user ID, you must first associate the certificate with a RACF user ID, using one of the following procedures:

For more information on certificate mapping, see the IBM® Redpaper™J2C Security on z/OS®.


Information Information

Feedback


Timestamp icon Last updated: Wednesday, 27 August 2014


https://ut-ilnx-r4.hursley.ibm.com/tgzos_latest/help/topic/com.ibm.cics.tg.zos.doc//securing/topics/mapracf.html