IMS Version 9

Command Security When Using OM

For IMS command security, you have your choice of OM command security using RACF or equivalent, or IMS command security.

Recommendation: Use OM command security instead of IMS security.

By allowing OM to perform the security checks, commands which fail security authorization are not routed to IMS, reducing processing overhead and network traffic. When IMS command security is used, it is up to the user to ensure that all IMS systems use the same security profiles or user exits. If IMS systems in the same IMSplex use different security rules, the results of command security checking may be unpredictable. For more information about the IMS command verbs and keywords, resource names, and authorizations that are used for RACF security checking, see IMS Commands, RACF Access Authorities and Resource Names Table.

Go to the previous page Go to the next page

IBM Confidential

Downloads | Library | Support | Support Policy | Terms of use | Feedback
Copyright: IBM Corporation 1974, 2004 Copyright IBM Corporation 1974, 2004  timestamp Last updated: March, 2004