CICS TS for Z/OS: Using CICS Service Flow Runtime Chapter 1

CICS TS for Z/OS: Using CICS Service Flow Runtime Chapter 1

CICS Transaction Server for z/OS 5.5 Using CICS Service Flow Runtime IBM Note Before using this information and the product it supports, read the information in “Notices” on page 187. This edition applies to the IBM® CICS® Transaction Server for z/OS® Version 5 Release 5 (product number 5655-Y04) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 1974, 2020. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this PDF.....................................................................................................vii Chapter 1. Product overview..................................................................................1 The runtime environment and BTS..............................................................................................................2 The service flow project tools......................................................................................................................4 Benefits of CICS Service Flow Runtime and service flow project tools..................................................... 5 Server adapters............................................................................................................................................5 Front End Programming Interface (FEPI) server adapter..................................................................... 6 Link3270 server adapter........................................................................................................................ 7 Program link server adapter...................................................................................................................7 Queue server adapter.............................................................................................................................8 Web service server adapter....................................................................................................................8 Sequence of tasks for using CICS Service Flow Runtime and service flow project tools.......................... 9 Service flow runtime terminology............................................................................................................. 10 Chapter 2. What's new.........................................................................................13 Support for Rational Developer for IBM z Systems.................................................................................. 13 Changes to the installation........................................................................................................................ 13 Enhancements to deploying and managing service flows........................................................................13 New processing mode............................................................................................................................... 14 Enhancements to server adapters............................................................................................................ 14 Changes to error handling......................................................................................................................... 15 Chapter 3. Planning............................................................................................. 17 Discovery phase of an application transformation project.......................................................................17 Planning phase of an application transformation project.........................................................................17 Deployment patterns................................................................................................................................. 18 How the processing mode is selected.......................................................................................................19 Considering security.................................................................................................................................. 19 Audit levels.................................................................................................................................................20 Chapter 4. Installing............................................................................................21 Software prerequisites.............................................................................................................................. 21 Performing postinstallation tasks..............................................................................................................21 Customizing the setup procedure DFHMAINJ.....................................................................................22 Running the product definition procedure DFHMASET.......................................................................26 Defining the PLT program DFHMAINS................................................................................................. 27 Defining the security of transactions................................................................................................... 27 Copying the build-time templates....................................................................................................... 28 Setting up data conversion...................................................................................................................28 Configuring the autostart procedure for the Link3270 facility state cleanup programs....................29 Adding support for BIDI transformation in service flows................................................................... 30 CICS Service Flow Runtime samples listing........................................................................................ 30 Chapter 5. Deploying a service flow......................................................................33 Deploying a new service flow.................................................................................................................... 33 Installing service flows.............................................................................................................................. 34 The service flow repository file................................................................................................................. 35 iii Chapter 6. Invoking a service flow....................................................................... 37 The service requester................................................................................................................................ 37 Invoking a service flow using a CICS-supplied interface......................................................................... 38 Invoking a service flow using the CICS-MQ bridge...................................................................................39 Invoking a service flow from a Web service..............................................................................................40 Sending the request message in containers............................................................................................. 40 Sending the request message in a COMMAREA........................................................................................42 Data conversion......................................................................................................................................... 43 Data conversion using the IBM MQ interface...................................................................................... 43 Data conversion using a CICS-supplied interface............................................................................... 43 Code page conversion.......................................................................................................................... 44 Request message containers.................................................................................................................... 44 Container DFHMAC-ALLPARMS........................................................................................................... 44 Container DFHMAC-ERROR..................................................................................................................44 Container DFHMAC-LNK3270V1......................................................................................................... 45 Container DFHMAC-REQUESTV1.........................................................................................................46 Container DFHMAC-SYSPARMV1.........................................................................................................46 Container DFHMAC-USERDATA........................................................................................................... 46 Container DFHWS-DATA.......................................................................................................................46 Request message headers........................................................................................................................ 47 DFHMAH header structure...................................................................................................................47 DFHMAH field definitions.....................................................................................................................48 Chapter 7. Managing service flows......................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    206 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us