Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
To prevent an attacker from spoofing their identity, accessing restricted data, or tampering with the data, you should do the following:
Place the computer that is running Transaction Integrator (TI) in a secure ___location.
Confirm that the access permissions to TI programs, TI components, and the registry are set correctly.
Use host-initiated Single Sign-On (SSO) in conjunction with valid host UID and PWD passed in the initial connection flows.
Use a secure network connection (for example, CICS TRM over IPsec-protected TCP/IP network connection).
You can also help mitigate this threat with the following deployment scenarios:
Host-initiated SSO
You can learn more about this threat by reading about the following:
How to help secure remote access to SQL Server (for example, integrated Windows security)
How to send a valid host user ID
How to send a valid host password
See Also
Transaction Integrator Threat Mitigation
Single Sign-On in Transaction Integrator