O'Reilly logo

An Introduction to IMS: Your Complete Guide to IBM Information Management System by Steve Nathan, Sandy Sherrill, Rick Long, Moira McFadden Lanyi, Margaret Wilson, Kenny Blackman, John Butterweck, Diane Goff, Barbara Klein

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Access to and from IMS

Secure access to IMS is achieved by IMS-managed application programs that require the resources provided by the IMS Database Manager (IMS DB), the IMS Transaction Manager (IMS TM), and IMS System Services. These application programs run in IMS dependent regions and use IMS-supported programming languages to access IMS resources through the DL/I and Java Database Connectivity (JDBC) application programming interfaces (APIs). Secure accesses to IMS-managed resources from application programs that run in other runtime environments use the principles of service-oriented architecture and the components of the IMS SOA Integration Suite. When an end user accesses IMS, both application program types are available.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required