Previous Topic: The TSSISMU2 UtilityNext Topic: SMU Terminal Based Security to CA Top Secret Conversion


Terminal Based Security to CA Top Secret Conversion

SMU provides security for transactions and commands by identifying the terminals at which the transactions and commands are entered.

SMU has two ways to define this security:

In both cases the statements establish a relationship between IMS LTERMs and the IMS commands and transactions that can be entered at the terminals.

The CA Top Secret IMS interface provides security for IMS transactions and commands entered at a terminal.

To provide user-based security in CA Top Secret for an IMS transaction or command, a PERMIT is issued for the transaction or command permitting access to a specific user or to a profile. This is not a direct parallel to SMU terminal-based security. Because it is based on user identification and user-based security policy, it is the best practice implementation for IMS security, and should be used unless it is impractical or impossible.

For terminals that cannot or will not sign on, CA Top Secret provides a form of terminal based security for IMS transactions and commands called automatic terminal signon, or ATS. With ATS, an ACID is created for the terminal name. The ACID is used to permit access to IMS transactions and commands entered at the terminal. Because it is terminal based, this alternative does not provide user-level granularity in security policy. It should only be used if a terminal user cannot sign on, it is not important who the terminal user is, or if the physical security for the IMS terminal is sufficient to determine who the terminal user is.