Previous Topic: IMS Security Features

Next Topic: Password Validation

Signon Security

Most users will have to explicitly sign on to IMS, using the IMS /SIGN command. CA Top Secret checks that the user is authorized to access IMS. A user can be restricted from signing on to more than one terminal at a time.