Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved


Chapter 5 Installing the Service Gateway for CICS : Creating Control Table Definitions

Creating Control Table Definitions
Single CICS Region
If you are running a single CICS region, define the following programs in Resource Definition Online (RDO). You can also use the CICSDEFS member in the JCL data set to define these programs in LIST $OSTARNMR$.
Pointing to Program...
Usage Notes
Note the following when defining the transactions:
Note: You can specify TASKDATAKEY(CICS) but doing so is overrestrictive, preventing users from calling CICS external routines with EXECKEY(USER). Instead, users must define their program as EXECKEY(CICS), which allows the external CICS routine, if it contains an addressing error, to corrupt CICS storage.
TIBCO Object Service Broker is sensitive only to the specific transaction names HCUS, HOPT, and HCSS. You can assign your own names, one to four characters in length, or PF keys for the other transactions.
If you do use your own transaction name instead of HURN, you must specify the Execution Environment parameter CICSHURONTRAN=yourname. This is required for proper initialization of TIBCO Object Service Broker peer servers.
If you are running in a Multi-Region Option (MRO) environment or using Inter System Communications (ISC), you must include the following information so the user ID is passed to the Application Owning Region (AOR):
ATTACHSEC(IDENTIFY) (Connection definitions)
Multi-Region Option (MRO) Environment
If you are running in an MRO environment, define these transactions to both the Terminal Owning Region (TOR) and the AOR. The Execution Environment executes within the AOR.
Setting Up an MRO Environment
To set up an MRO environment, define the TIBCO Object Service Broker transactions as being remote to the TOR and local to the AOR. For pseudo-conversational CICS environments, the transaction invoking S6BCSSC2 must use the same transaction identification for both the TOR remote definition and the AOR local definition. It is recommended that the same transaction identification be used in both the TOR and AOR, whether or not you are using pseudo-conversational processing. Refer to TIBCO Object Service Broker Parameters for a description of the CICSPSEUDOCONVERSE parameter.
Define TOR Transaction Definitions
Define the following TOR transaction definitions using RDO. You can also use the CICSDEFS member in the JCL data set to define these definitions in LIST $OSTARTOR$.
Refer to Notes on Usage for additional information about defining the transactions.
All transactions are remote to the attached AOR except HOPT, which executes in the TOR and must be associated with the program S6BCSOPT. HOPT must not be defined as remote and it must run in the TOR.
Define AOR Transaction Definitions
Define the following AOR transaction definitions using RDO. You can also use the CICSDEFS member in the JCL data set to define these definitions in LIST $OSTARAOR$.
Notes on Usage
When defining the TOR and AOR transactions:
TIBCO Object Service Broker is sensitive only to the specific transaction names HCUS, HCSS, and HOPT. You can assign your own names, one to four characters in length, or PF keys for the other transactions.
If you are running TIBCO Object Service Broker in multiple CICS AORs off the same TOR, the HINT, HTRM, HURN, HINQ, HCUS, and HFUS transactions must have different names for each AOR.
When running MRO or using ISC, include the following information so the user ID is passed to the Application Owning Region (AOR):
ATTACHSEC(IDENTIFY) (Connection definitions)
Select a number of ISC sessions appropriate to your site. The greater the number of users you expect to be logged in to TIBCO Object Service Broker, the higher this number should be. The minimum required by TIBCO Object Service Broker is 2. The IBM default is 1.

Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved