As yet another suggestion, if you have CICS Transaction Server Version 4.2
or later (in at least one region/LPAR) then CICS SupportPac CA1Y is
available:

http://www.ibm.com/support/docview.wss?uid=swg24033197

This SupportPac includes both sending (SMTP) and receiving (IMAP and POP3)
functions using JavaMail. The receiving functions are not tested in this
specific CA1Y implementation, but JavaMail is well tested code. The
receiving functions would allow your mainframe to monitor one or more
e-mail inboxes for error messages, "unsubscribe" requests, etc. You can use
practically any programming language you wish to access these functions,
and you can also access these CICS-hosted CA1Y functions from external
batch programs through normal CICS batch interfaces. You can even format
and send rich e-mail content, including (for example) password-protected
PDF file attachments. Please note that CICS SupportPacs are provided
"as-is."

Regardless of what implementation approach you take, I recommend at least
encrypting the network connection(s) when sending/receiving e-mail, at
least with server certificate authentication. I also recommend configuring
any such connections so that, if adequate (or better) encryption cannot be
negotiated, the connection will drop with a return error that surfaces and
prompts corrective operator action. You also might want to think about how
to assure that the recipient (machine or human) of these e-mails determines
that they are genuine...and not from somebody else's "mainframe" promising
a share of a faraway prince's oil wealth. :-) Most if not all e-mail
security considerations apply to every platform, so if you've got some
smart security people in your wider organization then it'd probably be a
good idea to tap them. (N.B. "Smart security people" doesn't mean people
who *always* say "no.")

Note that e-mail is *always* asynchronous, even if you get return codes
indicating the message was sent to the SMTP server (only the next hop in
what could be a long e-mail transmission chain). You presumably have no
control over whether and when the recipient reads your e-mails, much less
what the recipient does. My observation is that e-mail tends to be overused
in business workflows, much like FTP is overused. Think of these protocols
as the batch-oriented protocols they are. If the business process really
ought not be batch-oriented, then e-mail (and FTP) probably aren't the
right protocols to choose.

--------------------------------------------------------------------------------------------------------
Timothy Sipples
IT Architect Executive, Industry Solutions, IBM z Systems, AP/GCG/MEA
E-Mail: sipp...@sg.ibm.com

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to