

Implementing Security for IMS › Resource Access Security
Resource Access Security
Valid on IMS r9.1 and above.
Resource Access Security (RAS) replaces application group names and AGN security. With RAS, CA Top Secret provides direct validation of the terminals, PSBs, and transactions that a dependent region accesses.
CA Top Secret RAS security is controlled by:
- The TYPE=RASRACF parameter of the IMS system definition SECURITY macro
- The ISIS= IMS initialization parameter
Before you enable RAS security:
- Ensure that appropriate security is defined to permit transactions to execute in the message processing regions. If a RAS transaction validation fails in a message processing region, the transaction is not scheduled in the message processing region. This is not a security violation and no violation message is issued. If none of the available message processing regions is permitted to schedule the transaction, the transaction is queued without execution and waits for a message processing region with the appropriate permissions. This can appear to the terminal user as a problem with the transaction or with the IMS system.
- Ensure that the IMS facility is specified in the FACILITY parameter for the batch message processing (BMP) region ACID. Security processing for the BMP region ACID occurs in the IMS control region
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|