Previous Topic: Implementation ConsiderationsNext Topic: CICS, IMS, and CA IDMS Considerations


Implementing Security for IMS

This section contains the following topics:

CICS, IMS, and CA IDMS Considerations

IMS to CA Top Secret Definition

Control Options for IMS

Define CA Top Secret to IMS

Signon Security

IMS Resource Security

Transaction Security

IMS Command Security

AGN Security (IMS r9.1 and Below)

Resource Access Security

PSB Security

DBD Security

Resource Security for the IMS /LOCK and /UNLOCK Commands (IMS r9.1 and above)

OTMA Resume TPIPE Request Security

Terminal Security

Considerations for the IMS AUTH Call

Administration Using the TSS Transaction

Application Interface