Application Development for IBM CICS Web Services

Total Page:16

File Type:pdf, Size:1020Kb

Application Development for IBM CICS Web Services Front cover Application Development for IBM CICS Web Services Overview of Web services in CICS updated for CICS TS 5.2 New Web service performance measurements for CICS TS 5.2 New SOA patterns for CICS TS 5.2 James O’Grady Ian Burnett Jim Harrison San Yong Liu Xue Yong Zhang ibm.com/redbooks International Technical Support Organization Application Development for IBM CICS Web Services January 2015 SG24-7126-02 Note: Before using this information and the product it supports, read the information in “Notices” on page xiii. Third Edition (January 2015) This edition applies to Version 5, Release 2, of IBM CICS Transaction Server. © Copyright International Business Machines Corporation 2015. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xiii Trademarks . xiv IBM Redbooks promotions . xv Preface . xvii Authors . xvii Now you can become a published author, too! . xix Comments welcome. xx Stay connected to IBM Redbooks . xx Summary of changes . xxi January 2015, Third Edition . xxi Part 1. Introduction . 1 Chapter 1. Overview of Web services . 3 1.1 Introduction . 4 1.2 Service-oriented architecture . 4 1.2.1 Characteristics . 6 1.2.2 Web services versus SOAs. 6 1.3 Web services. 7 1.3.1 Properties of a Web service . 7 1.3.2 Core standards . 8 1.3.3 Web Services Interoperability group . 11 1.3.4 Additional standards . 11 1.4 IBM WebSphere Service Registry and Repository . 13 1.5 SOAP . 13 1.5.1 The envelope . 13 1.5.2 Communication styles . 18 1.5.3 Encodings . 18 1.5.4 Messaging modes . 19 1.6 WSDL . 20 1.6.1 WSDL Document . 20 1.6.2 WSDL document anatomy . 21 1.6.3 WSDL definition . 25 1.6.4 WSDL bindings . 31 Chapter 2. CICS TS implementation of Web services . 35 © Copyright IBM Corp. 2015. All rights reserved. iii 2.1 Support for Web services in CICS TS . 36 2.1.1 Core aspects of Web services in CICS . 36 2.2 Tools for application deployment. 38 2.2.1 CICS Web Services Assistant. 38 2.2.2 IBM Rational Developer for System z v9.1 . 39 2.2.3 Other Options . 39 2.3 CICS as a service provider . 40 2.3.1 Preparing to run a CICS application as a service provider . 41 2.3.2 Processing the inbound service request . 43 2.4 CICS as a service requester . 44 2.4.1 Preparing to run a CICS application as a service requester . 45 2.4.2 Processing the outbound service request . 46 2.5 The CICS resource definitions . 47 2.5.1 URIMAP . 48 2.5.2 PIPELINE . 49 2.5.3 WEBSERVICE . 52 2.5.4 The Web service binding file (WSBind). 54 2.5.5 SOAPFAULT commands . 56 2.5.6 Mapping levels . 57 2.5.7 Enhancements with CICS TS V3.2 . 59 2.5.8 Additional enhancements with CICS TS 4.1 . 61 2.5.9 Use of WS-Addressing in CICS TS V4.1 applications . 63 2.5.10 AXIS2 Provider PIPELINEs in CICS TS V4.2 . 63 2.5.11 CICS Transaction Server V5.1 makes CONTAINERs easier . 63 2.5.12 Further enhancements in CICS TS V5.2. 63 2.5.13 Comparing releases of CICS Transaction Server . 64 Chapter 3. Development approaches . 67 3.1 Introduction . 68 3.2 Bottom-up approach . 69 3.3 Top-down approach . 71 3.4 Meet-in-the-middle approach . 72 3.5 The advantages of using Rational Developer for System z . 74 3.6 Web services versus CICS TCP/IP connectivity . 76 3.7 Conclusions. 77 Chapter 4. CICS catalog manager example application . 79 4.1 Samples for use with CICS Web Services . 80 4.2 Introduction to the catalog manager application . 80 4.3 Installation and setup of the base application . 81 4.3.1 Creating the VSAM data sets . 82 4.3.2 Defining the base application to CICS . 82 4.3.3 Configuring the example application . 83 iv Application Development for IBM CICS Web Services 4.3.4 Configuring code page support . 86 4.4 Web service support for the example application . 87 4.4.1 The Web client front end . 87 4.4.2 The CICS Web service client front end . 88 4.4.3 Order dispatch Web services endpoints . 89 4.4.4 Alternative Web service provider configuration. 89 4.5 Web services setup . 90 4.5.1 Creating the zFS directories . 91 4.5.2 Creating the PIPELINE definition . 91 4.5.3 Creating a TCPIPSERVICE . 93 4.5.4 Dynamically installing WEBSERVICE and URIMAP resources . 94 4.5.5 Creating the WEBSERVICE resources with RDO . 97 4.5.6 Creating the URIMAP resources with RDO . 98 4.5.7 Completing the installation . 99 4.6 Installing the client application. 99 4.6.1 FTP the client application . 100 4.6.2 Install the client . 100 4.6.3 Start the client . ..
Recommended publications
  • Cloud Enabling CICS
    Front cover Cloud Enabling IBM CICS Discover how to quickly cloud enable a traditional IBM 3270-COBOL-VSAM application Use CICS Explorer to develop and deploy a multi-versioned application Understand the benefits of threshold policy Rufus Credle Isabel Arnold Andrew Bates Michael Baylis Pradeep Gohil Christopher Hodgins Daniel Millwood Ian J Mitchell Catherine Moxey Geoffrey Pirie Inderpal Singh Stewart Smith Matthew Webster ibm.com/redbooks International Technical Support Organization Cloud Enabling IBM CICS December 2014 SG24-8114-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (December 2014) This edition applies to CICS Transaction Server for z/OS version 5.1, 3270-COBOL-VSAM application. © Copyright International Business Machines Corporation 2014. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii IBM Redbooks promotions . ix Preface . xi Authors. xii Now you can become a published author, too! . .xv Comments welcome. .xv Stay connected to IBM Redbooks . xvi Part 1. Introduction . 1 Chapter 1. Cloud enabling your CICS TS applications . 3 1.1 Did you know?. 4 1.2 Business value . 4 1.3 Solution overview . 5 1.4 Cloud computing in a CICS TS context. 6 1.5 Overview of the cloud-enabling technologies in CICS TS V5 . 11 1.5.1 Platform overview . 12 1.5.2 Application overview . 13 Chapter 2. GENAPP introduction. 15 2.1 CICS TS topology . 16 2.2 Application architecture. 17 2.2.1 GENAPP in a single managed region.
    [Show full text]
  • Of Friday 13 June 2008 Supplement No. 1 Birthday Honours List — United Kingdom
    05-06-2008 13:04:14 [SO] Pag Table: NGSUPP PPSysB Job: 398791 Unit: PAG1 Number 58729 Saturday 14 June 2008 http://www.london-gazette.co.uk B1 [ Richard Gillingwater. (Jun. 14, 2008). C.B.E. Commander of the Order of the British Empire, 2008 Birthday Honours, No. 58729, Supp. No. 1, PDF, p. B7. London Gazette. Reproduced for educationaly purposes only. Fair Use relied upon. ] Registered as a newspaper Published by Authority Established 1665 of Friday 13 June 2008 Supplement No. 1 Birthday Honours List — United Kingdom CENTRAL CHANCERY OF Dr. Philip John Hunter, C.B.E., Chief Schools THE ORDERS OF KNIGHTHOOD Adjudicator. For services to Education. Moir Lockhead, O.B.E., Chief Executive, First Group. St. James’s Palace, London SW1 For services to Transport. 14 June 2008 Professor Andrew James McMichael, F.R.S., Professor of Molecular Medicine and Director, Weatherall The Queen has been graciously pleased, on the occasion Institute of Molecular Medicine, University of Oxford. of the Celebration of Her Majesty’s Birthday, to signify For services to Medical Science. her intention of conferring the honour of Knighthood William Moorcroft, Principal, TraVord College. For upon the undermentioned: services to local and national Further Education. William Desmond Sargent, C.B.E., Executive Chair, Better Regulation Executive, Department for Business, Enterprise and Regulatory Reform. For services to Knights Bachelor Business. Michael John Snyder. For services to Business and to the City of London Corporation. Paul Robert Stephenson, Q.P.M., Deputy Commissioner, Dr. James Iain Walker Anderson, C.B.E. For public and Metropolitan Police Service.
    [Show full text]
  • 13347 CICS Introduction and Overview
    CICS Introduction and Overview Ezriel Gross Circle Software Incorporated August 13th, 2013 (Tue) 4:30pm – 5:30pm Session 13347 Agenda What is CICS and Who Uses It Pseudo Conversational Programming CICS Application Services CICS Connectivity CICS Resource Definitions CICS Supplied Transactions CICS Web Services CICS The Product What is CICS? CICS is an online transaction processing system. Middleware between the operating system and business applications. Manages the user interface. Retrieves and modifies data. Handles the communication. CICS Customers Banks Mortgage Account Reconciliations Payroll Brokerage Houses Stock Trading Trade Clearing Human Resources Insurance Companies Policy Administration Accounts Receivables Claims Processing Batch Versus Online Programs The two ways to process input are batch and online. Batch requests are saved then processed sequentially. After all requests are processed the results are transmitted. Used for order entry processing such as warehouse applications. Online requests are received randomly and processed immediately. Results are transmitted as soon as they are available. Response time tends to be sub-second. Used for applications – such as: Credit Card Authorization. Transaction Processing Requirements Large volume of business transactions to be rapidly and accurately processed Multiple users, single/sysplex or distributed With potentially: – A huge number of users – Simultaneous access to data – A large volume of data residing in multiple database types – Intense security and data integrity controls necessary The access to the data is such that: – Each user has the perception of being the sole user of the system – A set of changes is guaranteed to be logically consistent. If a failure occurs, any intermediate results are undone before the system becomes available again – A completed set of changes is immediately visible to other users A Business Transaction A transaction has a 4-character id.
    [Show full text]
  • Jul to Dec 2013
    Butterfly Conservation Hampshire and Isle of Wight Branch Page 1 of 33 Butterfly Conservation Hampshire and Saving butterflies, moths and our environment Isle of Wight Branch HOME ABOUT » EVENTS » CONSERVATION » SPECIES » SIGHTINGS » PUBLICATIONS » LINKS » ISLE OF WIGHT » MEMBERS » Wednesday 31st July Judith Frank reports from Byway stretch between Stockbridge and Broughton (SU337354) where the following observations were made: Holly Blue (2 "didn't settle long enough for me to be sure but seemed most likely to be hollies."), Peacock (1), Meadow Brown (2), Large White (9), Ringlet (9), Brimstone (1), Comma (2), Green-veined White (4), Gatekeeper (5). "On a day of only fleeting sunshine, I was interested to see what there might be on a section of byway through farmland not particularly managed for butterflies. A large patch of brambles yielded the most colour with the commas, gatekeepers and blues.". Speckled Wood Comma NT Owen reports from Roe Inclosure, Linwood (SU200086) where the following observations were made: Large White (2), Large Skipper (1), Gatekeeper (3), Small Skipper (1), Silver-washed Fritillary (4 "Including one Valezina form female"). Silver-washed Fritillary f. valezina Steve Benstead reports from Brading Down (SZ596867) where the following observations were made: Chalkhill Blue (5), Painted Lady (1), Clouded Yellow (1). "Overcast but warm". Gary palmer reports from barton common (SZ249931) where the following observations were made: Large White (2), Small White (3), Marbled White (3), Meadow Brown (20), Gatekeeper (35), Small Copper (1), Common Blue (1), vapourer moth (1 Larval "using poplar sapling"), peppered moth (1 Larval "using alder buckthorn"), buff tip moth (49 Larval "using mature sallow").
    [Show full text]
  • Introduction-To-Mainframes.Pdf
    Mainframe The term ‘MainFrame’ brings to mind a giant room of electronic parts that is a computer, referring to the original CPU cabinet in a computer of the mid-1960’s. Today, Mainframe refers to a class of ultra-reliable large and medium-scale servers designed for carrier-class and enterprise-class systems operations. Mainframes are costly, due to the support of symmetric multiprocessing (SMP) and dozens of central processors existing within in a single system. Mainframes are highly scalable. Through the addition of clusters, high-speed caches and volumes of memory, they connect to terabyte holding data subsystems. Mainframe computer Mainframe is a very large and expensive computer capable of supporting hundreds, or even thousands, of users simultaneously. In the hierarchy that starts with a simple microprocessor at the bottom and moves to supercomputers at the top, mainframes are just below supercomputers. In some ways, mainframes are more powerful than supercomputers because they support more simultaneous programs. But supercomputers can execute a single program faster than a mainframe. The distinction between small mainframes and minicomputers is vague, depending really on how the manufacturer wants to market its machines. Modern mainframe computers have abilities not so much defined by their single task computational speed (usually defined as MIPS — Millions of Instructions Per Second) as by their redundant internal engineering and resulting high reliability and security, extensive input-output facilities, strict backward compatibility with older software, and high utilization rates to support massive throughput. These machines often run for years without interruption, with repairs and hardware upgrades taking place during normal operation.
    [Show full text]
  • IBM Presentation Template Full Version
    Maria Luisa Lopez de Silanes – IIB ID developer 25 March 2014 Graphical Data Mapping in IBM Integration Bus v9 Marisa Lopez de Silanes IBM Integration Bus Development IBM Hursley Park, UK [email protected] © 2009 IBM Corporation Agenda . Graphical Data Mapping overview . Designing a message map . Graphical Data Mapping editor . Editing message maps . Transforming a SOAP message . Executing a message map . Troubleshooting message maps 2 © 2014 IBM Corporation Graphical Data Mapping . Graphical data maps offer the ability to achieve the transformation of a message without the need to write code, providing a visual image of the transformation, and simplifying its implementation and ongoing maintenance. A message map is the IBM Integration Bus implementation of a graphical data map. It is based on XML schema and XPath 2.0 standards. You can use a message map to perform any of the following actions: – Transform a message – Enrich a message with data available in an external database – Modify data located in an external database • Note: You can call DB2 stored procedures from a graphical data map in IBM Integration Bus version 9 – Route a message based on content. 3 © 2014 IBM Corporation Designing a message map . The data structure that you define in a message map for an input or an output message is the IBM Integration Bus internal representation of the message. Each data transformation is driven by the type of the output element and the mapping operation required to calculate its value. A conditional expression can be defined per transform to define the condition under which a transform should be applied.
    [Show full text]
  • CICS Transaction Server for OS/390 Installation Guide
    CICS® Transaction Server for OS/390® Installation Guide Release 3 GC33-1681-30 CICS® Transaction Server for OS/390® Installation Guide Release 3 GC33-1681-30 Note! Before using this information and the product it supports, be sure to read the general information under “Notices” on page xi. Third edition (June 1999) This edition applies to Release 3 of CICS Transaction Server for OS/390, program number 5655-147, and to all subsequent versions, releases, and modifications until otherwise indicated in new editions. Make sure you are using the correct edition for the level of the product. This edition replaces and makes obsolete the previous edition, SC33-1681-00. The technical changes for this edition are summarized under ″Summary of changes″ and are indicated by a vertical bar to the left of a change. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. At the back of this publication is a page entitled “Sending your comments to IBM”. If you want to make comments, but the methods described are not available to you, please address them to: IBM United Kingdom Laboratories, Information Development, Mail Point 095, Hursley Park, Winchester, Hampshire, England, SO21 2JN. When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright International Business Machines Corporation 1989, 1999. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
    [Show full text]
  • CA Datacom CICS Services Best Practices Guide
    CA Datacom® CICS Services Best Practices Guide Version 14.02 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the “Documentation”), is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA and may not be disclosed by you or used for any purpose other than as may be permitted in (i) a separate agreement between you and CA governing your use of the CA software to which the Documentation relates; or (ii) a separate confidentiality agreement between you and CA. Notwithstanding the foregoing, if you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT.
    [Show full text]
  • Enterprise PL/I for Z/OS V5.3 Compiler and Runtime Migration Guide Part 1
    Enterprise PL/I for z/OS Version 5 Release 3 Compiler and Run-Time Migration Guide IBM GC27-8930-02 Note Before using this information and the product it supports, be sure to read the general information under “Notices” on page 181. Third Edition (September 2019) This edition applies to Version 5 Release 3 of Enterprise PL/I for z/OS, 5655-PL5, and to any subsequent releases until otherwise indicated in new editions or technical newsletters. Make sure you are using the correct edition for the level of the product. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address below. A form for readers' comments is provided at the back of this publication. If the form has been removed, address your comments to: IBM Corporation, Department H150/090 555 Bailey Ave San Jose, CA, 95141-1099 United States of America When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Because IBM® Enterprise PL/I for z/OS® supports the continuous delivery (CD) model and publications are updated to document the features delivered under the CD model, it is a good idea to check for updates once every three months. © Copyright International Business Machines Corporation 1999, 2019. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables.................................................................................................................. xi Figures............................................................................................................... xiii About this book....................................................................................................xv Using your documentation........................................................................................................................
    [Show full text]
  • CICS System Services
    CICS System Services Mainframe CICS System Services July 2021 Rate Description Rate FY22/FY23 Debit Code CICS zIIP $0.1780/CICS Unit 5 CICS zIIP $0.1780/CICS Unit 6 All OCIO rates can be found at: https://cio.nebraska.gov/financial/serv-rates.html General Overview Customer Information Control System or CICS System Services provide an interactive transaction-based processing environment to host business applications that are reliable, scalable, and secure. CICS features include: • Ability to process a high volume of transactions. • Ability to efficiently support event processing, dynamic scripting, web browser (HTML), and 3270 presentation of data. • Ability to access multiple types of data structures, such as relational databases, hierarchical databases (IMS), and VSAM data sets. • Ability to support other application features such as; report printing, document imaging, application help functionality, and other z/OS automation capabilities. Service Details The service includes: • 24/7 CICS application and business event hosting with traditional 3270 and web browser presentation. • z/OS Enterprise mainframe security and protection for CICS application software, application data, and user security. • 24/7 Service Desk support. This includes ‘incident troubleshooting’ for CICS application environments. • Complete CICS application data backup and recovery services. • Complete CICS application disaster recovery facilities and services provided. Office of the CIO/ Mainframe CICS System Services | Contact: CIO Service Desk: 402.471.4636 or 800.982.2468 1 CICS System Services • z/OS System automation available for unique CICS application mainframe requirements. • CICS automated services to coordinate application “On-line” and “Batch” processes. • Automated software to generate CICS maps. • Automated software to assist applications with reporting (style sheets).
    [Show full text]
  • Appendix A: Current Environment Overview the Following Subsections Provide an Overview of the Current Technical Environment
    1 Appendix A: Current Environment Overview The following subsections provide an overview of the current technical environment. N-FOCUS – Nebraska’s Legacy Integrated Health and Human Services and Benefits Application Nebraska Family Online Client User System (N-FOCUS) is an integrated system that automates benefit/service delivery and case management for more than 30 DHHS programs, including Aid to Dependent Children (ADC), Supplemental Nutrition Assistance Program (SNAP), Child Welfare and Medicaid. The system was initially developed in partnership with Accenture as the prime Systems Integrator. N-FOCUS functions include client/case intake, eligibility determination, case management, service authorization, benefit payments, claims processing and payments, provider contract management, interfacing with other private, state and federal organizations, and management and government reporting. N-FOCUS was implemented in production in mid-1996 and is operational statewide. The typical N-FOCUS user is a DHHS or contracted employee. N-FOCUS supports over 2500 workers, operating from offices around the State as well as from 4 customer service centers and a centralized scanning facility. Some cases are assigned to specific workers; however, the majority of cases are managed via a universal caseload methodology coordinated by the customer service centers. N-FOCUS has both batch and online components and stores data in Db2 and SQL Server. The Db2 database has over 650 tables, some with a corresponding archive table. There are over 785 relationships between tables, 1278 indexes, and over 9665 attributes. There are over 1.7 billion rows of production data with over 193 million rows in one table with an average table size of 3.2 million rows.
    [Show full text]
  • Websphere MQ V6, Websphere Message Broker V6, and SSL
    Front cover WebSphere MQ V6, WebSphere Message Broker V6, and SSL WebSphere MQ SSL channels on Windows WebSphere MQ V6 and WebSphere Message Broker V6 (the Toolkit) Connecting WebSphere MQ and Message Broker using SSL Saida Davies Emir Garza Vicente Suarez ibm.com/redbooks Redpaper International Technical Support Organization WebSphere MQ V6, WebSphere Message Broker V6, and SSL November 2006 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (November 2006) This edition applies to Version 6 of IBM WebSphere MQ and Version 6 of IBM WebSphere Message Broker. © Copyright International Business Machines Corporation 2006. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team that wrote this Redpaper . ix Become a published author . x Comments welcome. xi Chapter 1. Connecting two Windows queue managers using SSL . 1 1.1 Basic configuration . 2 1.1.1 Creating the queue managers. 2 1.1.2 Setting up the channels. 3 1.1.3 Checking the channels . 4 1.2 SSL: The very basics . 5 1.3 Process overview . 6 1.3.1 Creating a key repository for each queue manager . 6 1.3.2 Obtaining a certificate for each queue manager . 8 1.3.3 Installing the certificates in the key repositories . 10 1.3.4 Setting up the channels for SSL authentication and testing . 18 Chapter 2. WebSphere MQ V6 clients on Windows . 21 2.1 Process overview .
    [Show full text]