IBM SC33-1683-02 User Manual

Page 633

Advertising
background image

Chapter 20. Writing a security exit program for IIOP

Considerations common to all user-replaceable programs

Note that the comments contained in “Chapter 5. General notes about
user-replaceable programs” on page 401
apply to this chapter.

Incoming requests using the Internet Inter-Orb Protocol (IIOP) are processed by
CICS under a default USERID, unless you provide a security user-replaceable
program to assign a new USERID.

You can define the name of the program in the URM option of the TCPIPSERVICE
resource definition for the IIOP port. If no name is specified, CICS will call
DFHXOPUS for IIOP requests.

If present, the IIOP security program is called for all incoming IIOP requests, before
processing by the CICS Object Request Broker (ORB) function. It is passed:

v

The incoming IIOP message buffer

v

The TRANSID defined in the TCPIPSERVICE resource definition for the TCP/IP
port receiving the request

A USERID can be returned, and the TRANSID may be changed, but other fields are
provided for information only.

For a detailed description of the DFHXOPUS user-replaceable program, and its
interfaces, see the

CICS Internet Guide.

© Copyright IBM Corp. 1977, 1999

601

|

|
|

|
|
||

|

|
|
|

|
|
|

|
|

|

|
|

|
|

|
|

Advertising