Configuring the BMS 3270 Intrusion Detection Service
Modification of protected fields might compromise the security of an application. The CICS® BMS 3270
Intrusion Detection Service allows CICS to detect whether a
3270 emulator invalidly modifies a protected field that is generated by a BMS map. This feature
works together with the 3270 Intrusion Detection Service that is provided by IBM® z/OS® Communications Server. You can opt into this
capability by configuring the com.ibm.cics.bms.ids
feature toggle.
For instructions on how to enable a feature toggle, see Specifying feature toggles. For more information about 3270 sessions, see 3270 sessions.
- Feature toggle for enabling this feature
-
com.ibm.cics.bms.ids={true| false }
- Feature toggles for setting configuration options
-
- com.ibm.cics.bms.ids.action={abend|ignore| log }
- Specifies how CICS handles the detection of a
protected field that is overwritten by a 3270 emulator. The values are as follows:
- abend
- CICS abends transaction ABSX.
- ignore
- CICS ignores the request.
- log
- CICS issues a DFHTF0200 message with the details of the overwrite, which is the default.
This configuration option sets the default that is passed to the URM DFHBMSX. If you need to configure BMS 3270 IDS to be specific about which applications or maps the service applies to, use the URM DFHBMSX for configuration. In general, this configuration would be necessary only if an application made unusual use of the 3270 data stream and reported false hits. The URM DFHBMSX overrides this configuration option.
- com.ibm.cics.bms.ids.vtamignore={ true |false}
- Use this option only under the guidance of IBM service. It specifies whether CICS informs IBM z/OS Communications Server that it is taking responsibility for checking the data when it is sending 3270 data that is related to a BMS request. This option notifies IBM z/OS Communications Server Intrusion Detection Services that it can ignore the request.