Chapter 21. IMS Security

This chapter provides an overview of the IMS security features, provides information to help you establish resource security for an IMS online system, and describes both the resources that can be protected and the facilities available to protect them.

Although there are many similarities, security for the DB/DC and DCCTL environments is discussed separately from security for the DBCTL environment.

In This Chapter

Overview of DB/DC and DCCTL Security

Overview of DBCTL Security

Overview of DB/DC and DCCTL Security

When you initiate security safeguards, you must balance the requirements of the users who are responsible for the security of resources with those of the users who legitimately need access to those resources. ...

Get An Introduction to IMS: Your Complete Guide to IBM Information Management System now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.