Verify for CICS Modernization Guide
Verify for CICS is a testing product by Broadcom. Explore technical details, modernization strategies, and migration paths below.
Product Overview
Verify for CICS streamlines the testing of CICS applications through automation.
Key components include the capture engine, replay engine, test case repository, and reporting engine.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What is Verify for CICS and what does it do?
Verify for CICS automates the testing of CICS applications, including regression testing, functional testing, and performance testing. It captures and replays CICS terminal interactions, validates application behavior, and generates reports.
How does Verify for CICS work?
Verify for CICS uses a capture-and-replay approach. It records CICS terminal sessions, stores them as test cases, and then replays those test cases to validate application behavior after changes or updates.
What CICS resources does Verify for CICS support?
Verify for CICS supports various CICS resources, including BMS maps, transactions, programs, and files. It can validate data displayed on CICS screens, data written to files, and the execution of CICS transactions.
What kind of reporting capabilities does Verify for CICS offer?
Verify for CICS provides reporting capabilities that allow users to analyze test results, identify failures, and track testing progress. Reports can be generated in various formats, including HTML and PDF.
Technical
What configuration files are used by Verify for CICS?
Verify for CICS uses configuration files to define test environments, data sources, and other settings. These files are typically in a proprietary format.
How does Verify for CICS communicate with CICS regions?
Verify for CICS communicates with CICS regions using standard CICS intercommunication facilities. Specific protocols may include SNA/APPC or TCP/IP, depending on the CICS configuration.
What are the main system components of Verify for CICS?
The main components of Verify for CICS include the capture engine, the replay engine, the test case repository, and the reporting engine. The capture engine records CICS terminal sessions. The replay engine replays the recorded sessions. The test case repository stores the test cases. The reporting engine generates test reports.
What databases or storage mechanisms are used by Verify for CICS?
Verify for CICS uses a repository to store test cases and test results. This repository may be a VSAM file or a relational database, depending on the configuration.
Business Value
What is the business value of using Verify for CICS?
Verify for CICS reduces the time and cost associated with testing CICS applications. By automating the testing process, it enables faster feedback, reduces the risk of defects, and improves the overall quality of CICS applications.
How does Verify for CICS help with compliance?
Verify for CICS helps organizations meet compliance requirements by providing a comprehensive audit trail of testing activities. This audit trail can be used to demonstrate that CICS applications have been thoroughly tested and validated.
How does Verify for CICS improve the stability of CICS applications?
By automating regression testing, Verify for CICS ensures that changes to CICS applications do not introduce new defects or break existing functionality. This reduces the risk of costly production outages and improves the stability of CICS applications.
Security
What authentication methods are supported by Verify for CICS?
Verify for CICS supports authentication through RACF, ACF2, or Top Secret. User access is controlled through these external security managers.
What access control model is used by Verify for CICS?
Verify for CICS uses an access control model based on the security features of the underlying z/OS system. Access to test cases and other resources is controlled through RACF, ACF2, or Top Secret.
What encryption is used by Verify for CICS?
Verify for CICS does not encrypt test data or communication channels. Security relies on the underlying z/OS security infrastructure.
What audit/logging capabilities exist in Verify for CICS?
Verify for CICS provides audit logging capabilities that track user activity and system events. These logs can be used to monitor security and identify potential security breaches.
Operations
What administrative interfaces are available for Verify for CICS?
Verify for CICS provides a command-line interface (CLI) for administrative tasks. This CLI can be used to configure the system, manage users, and monitor performance.
How is user management handled in Verify for CICS?
User management in Verify for CICS is handled through the underlying z/OS security system (RACF, ACF2, or Top Secret). Users are defined and managed within these systems, and Verify for CICS uses these definitions for authentication and authorization.
What monitoring/logging capabilities exist in Verify for CICS?
Verify for CICS provides monitoring and logging capabilities that allow administrators to track system performance and identify potential problems. Logs can be viewed through the CLI or exported to external monitoring tools.
What are the main configuration parameters for Verify for CICS?
Configuration parameters for Verify for CICS are stored in configuration files. These parameters control various aspects of the system, such as the location of test case repositories, the communication protocols used, and the security settings.
Ready to Start Your Migration?
Download our comprehensive migration guide for Verify for CICS or calculate your ROI.