O'Reilly logo

An Introduction to IMS: Your Complete Guide to IBM Information Management System by Steve Nathan, Sandy Sherrill, Rick Long, Moira McFadden Lanyi, Margaret Wilson, Kenny Blackman, John Butterweck, Diane Goff, Barbara Klein

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 21. IMS Security

This chapter provides an overview of the IMS security features, provides information to help you establish resource security for an IMS online system, and describes both the resources that can be protected and the facilities available to protect them.

Although there are many similarities, security for the DB/DC and DCCTL environments is discussed separately from security for the DBCTL environment.

In This Chapter

Overview of DB/DC and DCCTL Security

Overview of DBCTL Security

Overview of DB/DC and DCCTL Security

When you initiate security safeguards, you must balance the requirements of the users who are responsible for the security of resources with those of the users who legitimately need access to those resources. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required