CA Top Secret provides security protection for IMS transactions, applications, resources, and regions in the IMS/DC environments:
IMS uses the z/OS Standard Security Interface to drive CA Top Secret. No modifications to IMS or IMS installation exits are required. Some parameter changes to the basic IMS security macro are required to establish what is protected by CA Top Secret and what is to be protected by IMS default security (SMU).
To sign on to IMS, a user’s ACID must be authorized to access the IMS facility.
To grant access authorization you can:
Most users have to explicitly sign on to IMS using the IMS SIGN command. CA Top Secret then checks that the user is authorized to access IMS.
Users can be restricted from signing on to more than one terminal at a time.
To secure IMS, enter the command:
TSS ADDTO(USER) FACILITY(IMSTEST)
CA Top Secret can:
Online jobs submitted under IMS are treated the same as for any other online facility.
Security administrators can use the TSS command under IMS to perform all security administration.
Changes to the security database made through a TSS command are immediately recognized by all facilities. CA Roscoe IE can be administered through an IMS session.
Multiple concurrent sign ons is a site‑selectable option.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|