Previous Topic: Securing CA Roscoe IENext Topic: Securing BATCH Jobs


Securing IMS

CA Top Secret provides security protection for IMS transactions, applications, resources, and regions in the IMS/DC environments:

IMS uses the z/OS Standard Security Interface to drive CA Top Secret. No modifications to IMS or IMS installation exits are required. Some parameter changes to the basic IMS security macro are required to establish what is protected by CA Top Secret and what is to be protected by IMS default security (SMU).

Signon Security and Authorization Restrictions

To sign on to IMS, a user’s ACID must be authorized to access the IMS facility.

To grant access authorization you can:

Most users have to explicitly sign on to IMS using the IMS SIGN command. CA Top Secret then checks that the user is authorized to access IMS.

Users can be restricted from signing on to more than one terminal at a time.

To secure IMS, enter the command:

TSS ADDTO(USER) FACILITY(IMSTEST)

Terminal Security

CA Top Secret can:

Job Submission Validation

Online jobs submitted under IMS are treated the same as for any other online facility.

Security Administration

Security administrators can use the TSS command under IMS to perform all security administration.

Changes to the security database made through a TSS command are immediately recognized by all facilities. CA Roscoe IE can be administered through an IMS session.

Multiple Sign ons

Multiple concurrent sign ons is a site‑selectable option.