This chapter provides an overview of the IMS security features, provides information to help you establish resource security for an IMS online system, and describes both the resources that can be protected and the facilities available to protect them.
Although there are many similarities, security for the DB/DC and DCCTL environments is discussed separately from security for the DBCTL environment.
In This Chapter
When you initiate security safeguards, you must balance the requirements of the users who are responsible for the security of resources with those of the users who legitimately need access to those resources. ...