Previous Topic: Control Options for IMSNext Topic: Violation Thresholds


Modes of Operation

The following table summarizes access operation by mode.

FUNCTION

DORM
MODE

WARN
MODE

IMPL
MODE

FAIL
MODE

Signon Processing Required

 

X

X

X

Full Password Controls

1

2

2

X

Transaction Security Active

 

3

X

X

Command Security

 

3

X

X

RAS Security
(IMS r9.1 and above)

 

3

X

X

PSB Protection Active (BMPs, MPPs)

 

3

2

X

PSB Protection Active (DLIBATCH)

 

3

5

6

DBD Protection Active (BMPs, MPPs)

 

3

2

X

DBD Protection Active (DLIBATCH)

 

3

5

6

IMS LOCK Command Resource Security
(IMS 9.1 and above)

 

3

X

X

OTMA Resume TPIPE Security
(IMS r9.1 and below)

 

3

X

X

Terminal Protection Active

 

3

X

X

Signon User Exit Invoked

(DFSCSGN0)

X

X

4

X

Transaction User Exit Invoked

(DFSCTRN0)

X

X

X

X

TSS Command Available

X

X

X

X

Application Interface Available

X

X

X

X

Logging Available

 

X

X

X

Auditing Available

 

X

X

X

X

All Users in All Conditions

1

If Explicit Signon is Performed

2

For Defined Users Only

3

Messages and Logging Only

4

For Undefined Users Only

5

If DL1B is YES, then security is enforced for defined users. If set to NO (the default), then no security takes place.

6

If DL1B is YES, then security is enforced for all users. If set to NO (the default), then no security takes place.

Note: Security Control Administrators-that is, MSCAs, SCAs, LSCAs, ZCAs, VCAs, DCAs-can use their CA Top Secret password in any mode.