Previous Topic: CBIND Resource Class—Secure CBIND for z/OS ObjectsNext Topic: CPCMD Resource Class—Secure CP Commands


CIMS Resource Class—Secure IMS Commands

Valid on z/OS.

Use CIMS to secure IMS commands.

This resource class has the following format for TSS ADDTO/REVOKE

TSS ADDTO(acid) CIMS(command,...)
Command length

Three‑character IMS verb

Capacity of list

One to five commands per TSS command

When used with TSS PERMIT/REVOKE, this resource class has the following format:

TSS PERMIT(acid) CIMS(command,...)
Command length

Three characters

Capacity of list

One to five commands per TSS command

CIMS is used with:

The administrator can:

Prefixing is supported. Masking is not.

Examples: CIMS resource class

This example defines the IMS/DISPLAY command to DEPT01:

TSS ADDTO(DEPT01) CIMS(DIS)

The administration may now PERMIT access to users or profiles that require access.

This example removes ownership:

TSS REMOVE(DEPT01) CIMS(DIS)

This example grants USER42 the ability to use the IMS/START command:

TSS PERMIT(USER42) CIMS(STA)