Each DPC application type that originates a user request (GUI, proxies, or internet client) provides some facility for placing data into the CA Gen variables CLIENT_USER_ID and CLIENT_PASSWORD. For generated the DPC applications these variables are read/write system attributes. For the proxies, they are application data variables with corresponding get and set methods.
For the DPC applications that flow to a non-EJB and a non-. NET Server, the supporting runtime invokes a client security user exit (such as WRSECTOKEN). This client security user exit indicates whether the CLIENT_USER_ID and CLIENT_PASSWORD variables are used as security data associated with a cooperative flow request. That same user exit also influences how the runtime incorporates the security data into the cooperative flow request.
For the flows between a DPC and DPS that operate in the same execution environment and have processing that does not use a CFB or a Tuxedo View32 buffer (Java clients flowing to EJBs and .NET clients flowing to .NET Server), the CLIENT_USER_ID and CLIENT_PASSWORD system attributes are always transmitted (serialized) as part of the Import data that are exchanged between the DPC and the DPS.
For the DPC applications that flow to a non-EJB and non-. NET Server, the client security user exit influences how the security data is processed, as follows:
The client security user exit can indicate that Standard Security be used, as follows:
The client security user exit can indicate that Enhanced Security is used, as follows.
Note: For the flows using Tuxedo View32 data structure, the data in the USERID, PASSWORD, and security token fields is populated in corresponding fields in the flows View32 data structure.
For a DPC application that flows to an EJB or .NET Server, the client security user exit provides the DPC application the opportunity to provide a user-defined security object. This object is similar in function to the security token described earlier.
The DPC GUI clients can include security processing that a CA Gen communications program provides such as the Client Manager. Other DPC client types can involve the use of a Communications Bridge.
The GUI DPC applications use the Client Manager as part of their security solution by having the Client Manager supply a user ID and password for a cooperative flow.
Note: For more information about security processing specific to the Client Manager, see the Distributed Processing—Client Manager User Guide.
Customers of CA Gen can optionally use a Communication Bridge to service cooperative flows from many clients. The Communications Bridge can be involved in security processing by utilizing the security data that is transmitted in the CFB as part of the cooperative flow.
Note: For more information about the security processing specific to the Communications Bridge, see the Distributed Processing– Communications Bridge User Guide.
Client-side security processing can also involve security processing that is provided as part of a third-party vendor product, as follows:
For specific details about how to incorporate security processing that is external to CA Gen cooperative processing, see the relevant vendor documentation.
|
Copyright © 2014 CA.
All rights reserved.
|
|