Abstract:
A technique for displaying application processing times includes monitoring incoming packets and outgoing packets as the incoming packets enter and the outgoing packets exit a time critical application. The incoming packets and the outgoing packets are correlated to determine application processing times for the time critical application. Finally, application processing time distributions for a desired time period are graphically displayed for the application processing times.
Abstract:
The present invention provides a method, system, and computer program product which enables changing user credentials that are used to access legacy host applications and/or systems which provide legacy host data during a secure host access session which is authenticated using a digital certificate and is protected by a host-based security system, such as RACF (Resource Access Control Facility, a product offered by the IBM Corporation), where these changed credentials are used to authenticate a user after previously-provided credentials have been used for authentication earlier in the same session. The changed credentials may belong to the same user, where that user happens to have a different user ID and/or password for different legacy host applications and wishes to change from accessing one legacy host application to accessing another. Or, the changed credentials may be used to enable a different user to interact with the same legacy host application used by the previously-authenticated user. The disclosed technique may also be used advantageously to authenticate a user for accessing an application, when the user's credentials are not changing.
Abstract:
The present invention provides a method, system, and computer program product for enabling a user to provide a single system sign-on for accessing one or more legacy host applications and/or one or more systems which provide legacy host data (such as legacy database systems) during a secure host access session which is authenticated using a digital certificate and is protected by a host-based security system, such as RACF (Resource Access Control Facility, a product offered by the IBM Corporation), where the same set of credentials must be provided more than once during the secure session. The subsequent provision of the credentials may be transparent to the user, and does not require change to existing legacy applications or systems.
Abstract:
A method and system for running application code originally developed as simple Java Beans, in an Enterprise Java Bean (EJB) environment, without modifying the original application code is described. This is accomplished by running one or more original Java beans in an EJB environment based on control from an external program, using at least the steps of defining a single generic EJB and installing the single generic EJB in an EJB container; generating EJB support code for each of the one or more original Java beans, and executing the EJB support code to drive the generic EJB to perform the functions of the one or more original Java beans in an EJB environment.