Chapter 3. Access to and from IMS

Secure access to IMS is achieved by IMS-managed application programs that require the resources provided by the IMS Database Manager (IMS DB), the IMS Transaction Manager (IMS TM), and IMS System Services. These application programs run in IMS dependent regions and use IMS-supported programming languages to access IMS resources through the DL/I and Java Database Connectivity (JDBC) application programming interfaces (APIs). Secure accesses to IMS-managed resources from application programs that run in other runtime environments use the principles of service-oriented architecture and the components of the IMS SOA Integration Suite. When an end user accesses IMS, both application program types are available.

Get An Introduction to IMS: Your Complete Guide to IBM Information Management System now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.