Bewerken

Delen via


Protect the Local File System, Database, and Registry

To prevent an attacker from spoofing their identity, accessing restricted data, or tampering with the data, you should do the following:

  • Place the computer that is running Transaction Integrator (TI) in a secure location.

  • Confirm that the access permissions to TI programs, TI components, and the registry are set correctly.

  • Use host-initiated Single Sign-On (SSO) in conjunction with valid host UID and PWD passed in the initial connection flows.

  • Use a secure network connection (for example, CICS TRM over IPsec-protected TCP/IP network connection).

    You can also help mitigate this threat with the following deployment scenarios:

  • Host-initiated SSO

    You can learn more about this threat by reading about the following:

  • How to help secure remote access to SQL Server (for example, integrated Windows security)

  • How to send a valid host user ID

  • How to send a valid host password

See Also

Transaction Integrator Threat Mitigation
Single Sign-On in Transaction Integrator