Protect the Local File System, Database, and Registry

To prevent an attacker from spoofing their identity, accessing restricted data, or tampering with the data, you should do the following:

  • Place the computer that is running Transaction Integrator (TI) in a secure location.

  • Confirm that the access permissions to TI programs, TI components, and the registry are set correctly.

  • Use host-initiated Single Sign-On (SSO) in conjunction with valid host UID and PWD passed in the initial connection flows.

  • Use a secure network connection (for example, CICS TRM over IPsec-protected TCP/IP network connection).

    You can also help mitigate this threat with the following deployment scenarios:

  • Host-initiated SSO

    You can learn more about this threat by reading about the following:

  • How to help secure remote access to SQL Server (for example, integrated Windows security)

  • How to send a valid host user ID

  • How to send a valid host password

See Also

Transaction Integrator Threat Mitigation
Single Sign-On in Transaction Integrator