

Implementing Security for IMS › Terminal Security
Terminal Security
Terminals are owned resources; therefore, auditing and distributed administration can easily be performed. Ownership of a terminal protects the resource across all defined facilities; however, access can be limited to only specific facilities through the FACILITY keyword as part of the terminal definition. Time of day, day of week, access expiration, and action controls are also available.
The terminal name defined depends on your environment:
- IMS PTERM definition for all VTAM environments
- IMS LTERM definition for all BTAM environments and LU6 terminals
Notes:
- Terminal protection applies across all facilities with like terminal names. IMS PTERM definition will also limit VTAM terminals for facilities such as TSO. Be sure to check the implication of terminal security as related to TSO, CICS, or any other online facilities under CA Top Secret control..
- The FACILITY keyword specifies that the terminal can only be accessed through a particular facility, such as IMSTEST. Omission of FACILITY implies access through any defined IMS facility.
- Terminal and source restriction is in effect in the originating IMS region for MSC transactions. Terminal protection is not in effect in the target IMS region.
- ATS users are not automatically PERMITted access to owned terminal resources on the basis of their name alone.
Copyright © 2013 CA Technologies.
All rights reserved.
 
|
|