Enterprise Research z/OS

CICS/DupS Modernization Guide

SharingTools and Utilities3270CICS

CICS/DupS is a sharing product by Enterprise Research. Explore technical details, modernization strategies, and migration paths below.

Product Overview

CICS/DupS is a tool designed to manage and control CICS sessions on z/OS mainframes.

Without CICS/DupS, organizations may face challenges in managing CICS session sprawl, leading to performance issues and potential security vulnerabilities.

Modernization Strategies

Rehost

Timeline:
6-12 months

Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.

Refactor (Recommended)

Timeline:
18-24 months

Optimize application architecture for cloud while preserving business logic. Best ROI long-term.

Replatform

Timeline:
3-5 years

Complete rewrite to cloud-native architecture with microservices and modern tech stack.

Frequently Asked Questions

General

What does CICS/DupS do?

CICS/DupS controls duplicate CICS sessions. It limits the number of concurrent CICS sessions based on userid, CICS terminal ID, or VTAM LU. It also enables multiple CICS sessions from a single 3270 session.

Is this a system, application, or tool?

CICS/DupS is a tool that enhances CICS environments by providing session management capabilities. It is not a full system or application but rather a utility that extends the functionality of CICS.

What types of organizations use this?

Organizations that rely heavily on CICS for transaction processing and need to manage concurrent user sessions benefit from CICS/DupS. These are often large enterprises in industries like banking, insurance, and retail.

When should we consider CICS/DupS?

A company should consider CICS/DupS when they need to control the number of active CICS sessions to optimize resource utilization, enforce licensing restrictions, or improve security by limiting concurrent access.

What are the alternatives to CICS/DupS?

Alternatives to CICS/DupS include other CICS session management tools and custom-developed solutions. Some organizations may choose to implement session control through their security software or VTAM configuration.

Technical

What infrastructure is required?

CICS/DupS runs on z/OS and requires CICS Transaction Server. It operates within an LPAR and integrates with VTAM for terminal and LU management.

For mainframe products: Does this run in an LPAR?

CICS/DupS operates on the z/OS platform and is dependent on the CICS Transaction Server subsystem. It leverages VTAM for communication and terminal management.

Does this extend/enhance another product?

CICS/DupS extends the capabilities of CICS by adding session control features. It enhances CICS by providing granular control over concurrent sessions based on userid, terminal ID, or VTAM LU.

What other products or components must be present for this to work?

CICS/DupS requires CICS Transaction Server to be present. It also relies on VTAM for terminal and LU definitions. The security system, such as RACF, ACF2, or Top Secret, must be configured for user authentication.

Business Value

How does CICS/DupS provide business value?

CICS/DupS helps organizations optimize CICS resource utilization by limiting concurrent sessions. This can lead to cost savings by reducing the demand on mainframe resources and potentially lowering software licensing costs.

Does this help with license compliance?

By controlling the number of concurrent CICS sessions, CICS/DupS helps organizations enforce software licensing agreements. This ensures compliance and avoids potential penalties for exceeding license limits.

How does this improve user experience?

CICS/DupS can improve the user experience by preventing resource contention caused by excessive concurrent sessions. This ensures that users have adequate resources for their CICS transactions.

Security

How does CICS/DupS enhance security?

CICS/DupS can enhance security by limiting the number of concurrent sessions for a given user. This reduces the risk of unauthorized access and potential security breaches.

Does it integrate with security systems?

CICS/DupS integrates with z/OS security systems such as RACF, ACF2, and Top Secret to authenticate users and enforce access controls. This ensures that only authorized users can access CICS resources.

What audit/logging capabilities exist?

CICS/DupS provides audit logging capabilities to track session activity and identify potential security issues. These logs can be used to monitor user behavior and investigate security incidents.

Operations

How is CICS/DupS typically deployed?

CICS/DupS is typically deployed on-premise within the z/OS environment. It requires technical expertise to configure and integrate with CICS and VTAM.

What are common implementation challenges?

Implementing CICS/DupS requires a good understanding of CICS, VTAM, and z/OS security. Common challenges include configuring the product to meet specific business requirements and resolving conflicts with existing CICS customizations.

What ongoing operational requirements exist?

Ongoing operational requirements include monitoring CICS/DupS to ensure it is functioning correctly and maintaining the configuration as the CICS environment evolves. Regular audits of session control policies are also recommended.

Ready to Start Your Migration?

Download our comprehensive migration guide for CICS/DupS or calculate your ROI.

Calculate ROI