Previous Topic: IMS to CA Top Secret DefinitionNext Topic: Facility Matrix Resource Translation


IMS Multi-User Address Space Environment

Under IMS/TM, each user signed on to an IMS control region occupies part of the IMS control region address space. When the IMS user requests access to a resource, the operating system "sees" IMS performing the access-not the individual user. To protect resource accesses on the individual user level, IMS issues its own security checks on behalf of the user requesting the resource access.