|
New Features and Updates for APPX RouterLast Update: 11/17/01
4. APPX Mainframe Enhancements
==============================
Sessions established by the APPX Router now have additional status
information available. This includes the IP address of the originating
station, the encryption mode and preference tag in effect, the user ID,
inserted APPX data and the data block from the remote encryption database
or database DLL. This data is available with APPX v3.36.
For non-router established sessions, most extended data will be null,
except for APPX/TCP sessions direct to CICS, which will have an IP address
specified. SNA LU2 and LU6.2 sessions will include the LU name of the
originating node.
The additional data is retrieved after a successful APPX connect via the
APPX PPX-GET-EXTENDED-CONNECT-DATA function. This function returns a
"PPE-CONTROL-BLOCK" structure which is described in Appendix F,
"APPX/Mainframe Encryption/Extended Connect Info Block." This block
contains information about the node connecting to the mainframe, and if
an indirect (APPX Router) connection is involved, data from the Router,
including authentication information and information about the encryption
mode in effect, is included.
Programming notes:
- While no currently available mainframe APPX directly supports
encryption, applications should not depend on the
PPE-AUTHENTICATION-DATA being available only if the PPE-INDIRECT-LINK
flag is set.
- If both Router and non-Router based connections to the mainframe
APPX application are allowed, some care must be taken to ensure that
the authentication data is valid. It is technically possible to fake
the portion of the APPX datastream that contains the authentication
data from the APPX Router, if a non-APPX Router intermediated reliable
link APPX connection is established to the host. If the application
allows such connections, provisions should be made to validate the
source of the authentication data. If external authentication data
is presented to the mainframe APPX, the PPE-INDIRECT-LINK flag will
be set (if authentication, in a future version, is handled by the
mainframe APPX, that flag will not be set). If the PPE-INDIRECT-LINK
flag is set, the application should check the source of the data
by inspecting the PPE-LINK-TYPE, PPE-LU-NAME, PPE-SNA-NET-NAME and
PPE-IP-ADDRESS fields. Authentication data should only be accepted
from a trusted source.
|