IMS security

This topic provides information to help you establish resource security for an IMS™ online system and identifies the resources that can be protected and the facilities available to protect them, provides design considerations, and describes the steps that you need to take to activate security.

Although there are many similarities and overlaps, the security for the DB/DC and DCCTL environments is discussed separately from the security for the DBCTL environment.