Previous Topic: IMS Security FeaturesNext Topic: Password Validation for IMS


IMS Signon Security

Most users will have to explicitly sign on to IMS, using the IMS /SIGN command. CA Top Secret checks that the user is authorized to access IMS. A user can be restricted from signing on to more than one terminal at a time.