Home Page Icon
Home Page
Table of Contents for
Front cover
Close
Front cover
by Tito Paiva, Michael Jones, Mitch Johnson, Jonathan Lawrence, Carlos Donatucci, P
Liberty in IBM CICS: Deploying and Managing Java EE Applications
Front cover
Notices
Trademarks
Preface
Authors
Now you can become a published author, too!
Comments welcome
Stay connected to IBM Redbooks
Chapter 1. Installation and configuration
1.1 Getting your CICS region ready
1.2 zFS file system configuration
1.2.1 zFS configuration files
1.2.2 Autoconfiguration
1.2.3 zFS structure
1.2.4 zFS output files
1.2.5 zFS file permissions
1.2.6 zFS file encodings and editing tools
1.3 Setting up a Liberty JVM Server
1.3.1 JVM profile
1.3.2 Tailoring the JVM profile
1.3.3 Liberty specific options
1.3.4 IBM Language Environment runtime options
1.3.5 Creating a JVMSERVER resource
1.4 Tailoring server.xml
1.4.1 Adding Liberty features
1.4.2 Include files
1.4.3 Configuring the HTTP and HTTPS endpoints
1.4.4 CICS bundle deployed applications
1.4.5 Default web application
1.4.6 Liberty transaction log files
1.4.7 Sample server.xml file
1.4.8 Welcome page
Chapter 2. Deploying a web application
2.1 Building the restapp sample
2.1.1 Obtaining the sample code
2.1.2 Creating the Eclipse projects
2.2 Deploying a web application to Liberty
2.2.1 Deployment by using Liberty dropins
2.2.2 Deployment as an application element in server.xml
2.2.3 Deployment in a CICS bundle
2.2.4 Comparison of the deployment options
2.3 Advanced deployment options
2.3.1 Shared libraries
2.3.2 Global libraries
2.3.3 Deploying a prebuilt Java archive in a CICS bundle
2.3.4 Pausing and resuming a server
Chapter 3. Link to Liberty
3.1 Overview
3.1.1 Prerequisites
3.1.2 How it works
3.2 Link to Liberty sample application
3.2.1 Building the sample application
3.2.2 Sample application
3.2.3 Deploying the sample
3.2.4 Running the sample
3.2.5 Manual program definition
3.2.6 Updating a Link to Liberty program
3.3 Qualities of service
3.3.1 Transactions
3.3.2 Exception and abend processing
3.3.3 Security
3.3.4 Summary
Chapter 4. Connecting to Db2 by using JDBC
4.1 JDBC overview
4.1.1 JDBC drivers
4.1.2 Data sources
4.1.3 Static and dynamic SQL
4.2 Installing the JDBC Employee application
4.2.1 Liberty features
4.2.2 Data source definition
4.2.3 CICS resources
4.3 Using JDBC type 2 connectivity
4.3.1 Configuring CICS resources
4.3.2 Configuring server.xml
4.3.3 Binding the plan
4.3.4 Running the application
4.4 Using JDBC type 4 connectivity
4.4.1 Configuring CICS resources
4.4.2 Configuring server.xml
4.4.3 Running the application
4.4.4 Container managed security
4.5 Transactional support with JDBC
4.6 Tracing JDBC
Chapter 5. Connecting to IBM MQ by using JMS
5.1 Introduction to JMS
5.1.1 Java Message Service
5.1.2 Message Driven Beans
5.1.3 Java Naming and Directory Interface
5.1.4 Connection pooling
5.2 JMS sample application
5.2.1 Modifying the JMS sample application
5.2.2 Deploying the JMS sample application
5.2.3 Configuring Liberty for the JMS sample application
5.2.4 Describing the JMS updates to the JVM server profile
5.3 Required CICS resources
5.3.1 BUNDLE resources
5.3.2 URIMAP resource
5.3.3 Transaction resources
5.4 Required IBM MQ resources
5.4.1 Configuring IBM MQ Explorer
5.4.2 Defining the queues
5.5 Testing the sample applications
5.5.1 Testing the MQJMSDemo application
5.5.2 Testing the MySimpleMDB application
5.5.3 Use of the Execution Diagnostic Facility
5.6 Security
5.6.1 RACF resources
5.6.2 JMS security scenarios
5.6.3 Summary
5.7 Transport Layer Security
5.7.1 RACF resources
5.7.2 TLS debugging hints and tips
Chapter 6. Configuring Transport Layer Security support
6.1 JSSE and JCE
6.1.1 Updating the JCE policy files
6.2 TLS server authentication by using a Java keystore
6.3 TLS server authentication by using a RACF key ring
6.4 TLS client authentication
6.5 Hints and tips when using TLS
6.5.1 Tracing TLS
6.5.2 Enforcing TLS for web applications
6.5.3 HTTP persistent connections
6.5.4 TLS session timeout
6.5.5 Controlling the TLS version
6.5.6 Controlling the cipher suite
6.5.7 Restricting weak algorithms
6.6 Using cryptographic hardware with JSSE
6.6.1 Cryptographic hardware
6.6.2 Cryptographic software
6.6.3 Configuring TLS to use the cryptographic coprocessors
6.6.4 Monitoring cryptographic hardware
Chapter 7. Securing web applications
7.1 Overview
7.2 z/OS security configuration for Liberty JVM servers
7.2.1 Starting the angel process
7.2.2 Setting up access to the angel process
7.2.3 Profile prefix and required SAF profiles
7.3 Configuring a Liberty security registry
7.3.1 Configuring a basic user registry
7.3.2 Configuring a SAF registry
7.3.3 Configuring an LDAP registry
7.4 Authentication scenarios
7.4.1 Basic authentication with a SAF registry
7.4.2 Basic authentication by using LDAP credentials
7.4.3 Form-based login
7.4.4 Certificate-based client authentication
7.5 Authorization scenarios
7.5.1 URL-specific authorization by using EJBROLEs
7.5.2 Programmatic role authorization by using EJBROLEs
7.5.3 CICS transaction security with URIMAPs
7.6 Configuring SSO by using Lightweight Third-Party Authentication
7.6.1 Configuring LTPA
7.6.2 Disabling SSO in Liberty
7.6.3 Requiring TLS when using SSO
7.7 JSON client code with cookie printer
Chapter 8. Logging and monitoring
8.1 Message and log files
8.1.1 CICS logs
8.1.2 Java logs
8.1.3 Liberty server logs
8.1.4 JVM server trace output
8.2 Monitoring tools
8.2.1 CICS statistics records
8.2.2 CICS performance records
8.2.3 CICS Performance Analyzer
8.2.4 CICS Explorer
8.2.5 IBM Health Center
8.2.6 IBM Application Metrics for Java
8.2.7 Runaway tasks
8.2.8 CICS policies
Chapter 9. Port sharing and cloning regions
9.1 Sharing ports
9.1.1 Using WLMHEALTH
9.2 Cloning regions
9.2.1 Sharing application definitions
9.2.2 Sharing SSL configuration
9.2.3 Sharing feature configuration
9.2.4 Sharing LTPA keys
Back cover
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Note: Before using this information and the product it supports, read the information in “Notices” on page vii.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset