IBM CICS TS for Z/VSE V2R1: Enhancements Guide EXEC Interface Block
Total Page:16
File Type:pdf, Size:1020Kb
IBM CICS Transaction Server for z/VSE Version 2 Release 1 Enhancements Guide SC34-2685-00 IBM CICS Transaction Server for z/VSE Version 2 Release 1 Enhancements Guide SC34-2685-00 Note! Before using this information and the product it supports, be sure to read the general information under “Notices” on page xi. This edition applies to Version 2 Release 1 of the IBM licensed program CICS Transaction Server for z/VSE, program number 5655-VSE, and to all subsequent versions, releases, and modifications until otherwise indicated in new editions. This edition replaces GC34–5763–06. Order publications through your IBM representative or IBM branch office serving your locality. Publications are not stocked at the address given below. A form for readers' comments is provided at the back of this publication. If the form has been removed, address your comments to: IBM Deutschland Research & Development GmbH Department 3282 Schoenaicher Strasse 220 D-71032 Boeblingen Federal Republic of Germany You may also send your comments by FAX or via the Internet: Internet: [email protected] FAX (Germany): 07031-16-3456 FAX (other countries): (+49)+7031-16-3456 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. © Copyright IBM Corporation 1994, 2015. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Figures ..............vii Chapter 7. Using an existing connection to a CICS system .....25 Tables ...............ix Changing a CICS Explorer user workspace ....26 Notices ...............xi Chapter 8. Using Job EYUPARM to Trademarks ..............xi enter or modify debugging commands . 27 Accessibility ............xiii Chapter 9. Messages generated when Using Assistive Technologies ........xiii using the CICS Explorer .......29 Documentation Format ..........xiii About this publication ........xv Part 2. CICS Web support .....31 How to use this publication .........xv What you need to know to understand this Chapter 10. Configuring CICS Web publication ..............xv support ..............33 Notes on terminology ...........xv Controlling web support with system initialization Where to find more information .......xvi parameters ..............33 Defining resources to CICS .........34 Summary of changes ........xvii Configuring TCP/IP for z/VSE........40 Enabling lightpen support .........41 Running the sample application .......41 Part 1. CICS Explorer ........1 Chapter 11. EXEC CICS DOCUMENT . 43 Chapter 1. Introduction to the CICS DOCUMENT CREATE ..........43 Explorer...............3 DOCUMENT INSERT ...........47 Overview of the CICS Explorer Workbench ....4 DOCUMENT RETRIEVE ..........50 Example that uses a selection of CICS Explorer views 6 DOCUMENT SET ............52 Chapter 2. Supported Operations views 7 Chapter 12. EXEC CICS EXTRACT . 55 EXTRACT TCPIP ............55 Chapter 3. Supported CICS Management EXTRACT CERTIFICATE ..........57 Interface resources ..........9 Using an HTTP GET request for information on Chapter 13. EXEC CICS START ....61 resources ...............9 START BREXIT .............61 Using an HTTP PUT request to process a single resource ...............10 Chapter 14. EXEC CICS TS ......65 DELETEQ TS ..............65 Chapter 4. Restrictions when READQ TS ..............67 connecting to a CICS TS for z/VSE WRITEQ TS ..............70 system...............13 Chapter 15. EXEC CICS WEB .....75 Chapter 5. Installing and configuring WEB ENDBROWSE FORMFIELD .......75 WEB ENDBROWSE HTTPHEADER ......76 the CICS Explorer ..........15 WEB EXTRACT .............77 Configuring the z/VSE host for use with the CICS WEB READ FORMFIELD..........79 Explorer ...............15 WEB READ HTTPHEADER .........81 Obtaining a copy of the CICS Explorer .....18 WEB READNEXT FORMFIELD .......82 Performing the installation of the CICS Explorer . 18 WEB READNEXT HTTPHEADER .......84 WEB RECEIVE .............86 Chapter 6. Configuring a new WEB RETRIEVE .............88 connection to a CICS system .....21 WEB SEND ..............89 Adding a set of CICS Explorer credentials ....21 WEB STARTBROWSE FORMFIELD ......91 Adding a CICS Explorer connection ......22 WEB STARTBROWSE HTTPHEADER .....92 © Copyright IBM Corp. 1994, 2015 iii WEB WRITE ..............93 Using templates in your application ......119 The lifespan of a document.........120 Part 3. Using Secure Sockets Layer (SSL) ...............95 Part 6. CICS Resource Definitions Online changes .........125 Chapter 16. Introduction to Secure Sockets Layer (SSL) .........97 Chapter 22. CEDA DEFINE Overview of SSL ............97 DOCTEMPLATE ..........127 SSLandtheWeb............98 Encryption and Keys ...........98 Chapter 23. CEDA DEFINE PROFILE 129 Authentication and Certificates ........99 The Role of Certificate Authorities .......99 Chapter 24. CEDA DEFINE TCPIPSERVICE...........137 Chapter 17. Configuring CICS to use SSL...............101 Hardware prerequisites ..........101 Part 7. CICS Supplied Software prerequisites ..........101 Transactions changes ......141 Step 1: Decide Which Authorization Level You Require ...............101 Chapter 25. CEBR—temporary storage Step 2: Define the System Initialization Parameters 102 browse ..............143 Step 3: Define a TCPIPSERVICE Resource ....102 The HELP panel ............144 Step 4: Set Up Your z/VSE System for SSL Support 103 Step 5: Configure for Server Authentication . 103 Step 6: Configure for Client Authentication . 103 Chapter 26. CEDX — the execution Step 7: Configure for Client Certificate Mapping 104 diagnostic facility .........145 Application programming considerations ....104 CEDF transaction ............145 A sample application program: DFH0WBCA . 104 CEDX transaction ............146 Currently-Supported SSL Cipher Suites.....104 Chapter 27. CEMT INQUIRE/SET Part 4. Using the CICS Transaction commands ............149 Gateway with ECI.........105 CEMT INQUIRE DOCTEMPLATE ......151 CEMT INQUIRE/SET TASK ........153 Chapter 18. Introduction to the ECI / CEMT INQUIRE/SET TCPIP ........157 CEMT INQUIRE/SET TCPIPSERVICE .....158 CICS Transaction Gateway .....107 CEMT INQUIRE/SET TRANSACTION.....161 How the ECI and CICS Transaction Gateway are CEMT INQUIRE/SET TSQUEUE .......165 used ................107 How the CICS Transaction Gateway accesses CICS 108 The External Call Interface (ECI) .......108 Part 8. CICS channels and containers ............169 Chapter 19. Configuring for ECI via TCP/IP ..............111 Chapter 28. Overview of CICS Hardware prerequisites ..........111 channels and containers ......171 Software prerequisites ..........111 Defining a TCPIPSERVICE Resource for ECI . 111 Chapter 29. CICS API commands for Displaying the ATTACHSEC Attribute .....112 using channels and containers....173 ASSIGN ...............174 Part 5. Using CICS documents . 113 DELETE CONTAINER (CHANNEL) .....175 ENDBROWSE CONTAINER ........176 Chapter 20. The DOCUMENT GET CONTAINER (CHANNEL) .......177 application programming interface . 115 GETNEXT CONTAINER .........181 LINK ................182 Creating a document ...........115 MOVE CONTAINER (CHANNEL) ......184 PUT CONTAINER (CHANNEL) .......187 Chapter 21. Programming with RETURN ...............192 documents ............117 START CHANNEL ...........194 Setting symbol values ..........117 STARTBROWSE CONTAINER........198 Embedded template commands .......118 XCTL ................199 iv IBM CICS TS for z/VSE V2R1: Enhancements Guide EXEC Interface Block ...........200 Control block changes ..........248 Chapter 30. How to use channels and Chapter 37. Changes to containers.............201 User-Replaceable Programs .....249 Channels: quick start ...........201 DFHCNV ..............249 Using channels: some typical scenarios .....204 DFHUCNV ..............249 Creating a channel ...........207 The current channel ...........208 Chapter 38. Upgrade Dynamic The scope of a channel ..........213 Transaction Routing Programs ....251 Processing containers in a called sub-routine . 217 Information Passed to the Dynamic Routing Passing a channel to another program or task . 217 Program ...............251 Discovering which containers were passed to a program ...............218 Discovering which containers were returned from a Chapter 39. Monitoring and Statistics 253 link.................218 Summary of CICS monitoring ........253 CICS read-only containers .........219 Performance class monitoring ........253 Channels and Security ..........219 Exception class monitoring .........253 Designing a channel: Best practices ......219 Monitoring control table (MCT) .......253 Constructing and using a channel: an example . 220 The DFHMCT TYPE=RECORD Macro .....254 Dynamic transaction routing program with Monitoring utility program .........255 channels ...............222 Statistical changes ............255 Data conversion ............222 Benefits of channels ...........226 Chapter 40. Changes to the EXEC Migrating from COMMAREAs to channels . 227 CICS application programming interface .............259 Part 9. Migration to CICS Changes to rounding for ASKTIME and Transaction Server for z/VSE 2.1 . 233 FORMATTIME commands .........259 Changes to INQUIRE SYSTEM command ....259 Chapter 31. Migration Tasks - Chapter 41. How to migrate RPG II Overview .............235 online applications to CICS TS for z/VSE ...............261 Chapter 32. System Initialization Table - DFHSIT .............239 Chapter 42. Changed internal CICS Migration