Published on 27 November 2013
ISBN-10: 0738438901
ISBN-13: 9780738438900
IBM Form #: SG24-8161-00
Authors: Rufus Credle, Andy Armstrong, Chris Atkinson, Russell Bonner, Geoff Pirie, Inderpal Singh, Nigel Williams, Matthew Wilson and Mark Woolley
This IBM® Redbooks® publication provides information about how you can connect mobile devices to IBM Customer Information Control System (CICS®) Transaction Server (CICS TS), using existing enterprise services already hosted on CICS, or to develop new services supporting new lines of business. This book describes the steps to develop, configure, and deploy a mobile application that connects either directly to CICS TS, or to CICS via IBM Worklight® Server. It also describes the advantages that your organization can realize by using Worklight Server with CICS.
In addition, this Redbooks publication provides a broad understanding of the new CICS architecture that enables you to make new and existing mainframe applications available as web services using JavaScript Object Notation (JSON), and provides support for the transformation between JSON and application data. While doing so, we provide information about each resource definition, and its role when CICS handles or makes a request.
We also describe how to move your CICS applications, and business, into the mobile space, and how to prepare your CICS environment for the following scenarios:
This Redbooks publication provides information about the installation and configuration steps for both Worklight Studio and Worklight Server. Worklight Studio is the Eclipse interface that a developer uses to implement a Worklight native or hybrid mobile application, and can be installed into an Eclipse instance. Worklight Server is where components developed for the server side (written in Worklight Studio), such as adapters and custom server-side authentication logic, run.
CICS applications and their associated data constitute some of the most valuable assets owned by an enterprise. Therefore, the protection of these assets is an essential part of any CICS mobile project. This Redbooks publication, after a review of the main mobile security challenges, outlines the options for securing CICS JSON web services, and reviews how products, such as Worklight and IBM DataPower®, can help. It then shows examples of security configurations in CICS and Worklight.
Part 1. Introduction and architecture
Chapter 1. Introduction
Chapter 2. CICS use of mobile technologies
Chapter 3. CICS and IBM Worklight
Chapter 4. Patterns for JSON in CICS
Part 2. Setup and configuration
Chapter 5. Configuring CICS for the example scenarios
Chapter 6. IBM Worklight configuration
Chapter 7. Security and workload management
Chapter 8. Problem determination
Part 3. Application development and scenarios
Chapter 9. Language structure to JSON schema scenario
Chapter 10. JSON schema to language structure scenarios
Chapter 11. Developing a simple JSON web service client application
Chapter 12. IBM Worklight for CICS
Part 4. Appendix
Appendix A. Sample level for a JSON schema
Appendix B. Sample COBOL programs
Appendix C. Additional material