Configuration overview
These actions are required to configure IBM Security Guardium S-TAP for IMS.
Review the following steps, which are described in greater
detail in the following sections:
- Verify that you have the resource authorizations that are required to configure the product.
- Review the steps to plan your configuration and customize your environment.
- Set up the z/OS log streams. Review the CFRM and log stream size requirements, and the related security considerations, limitations, and restrictions. Define the log streams for batch and online jobs.
- Determine a naming convention for the agent (AUIASTC,
AUIFSTC, AUILSTC, and AUIUSTC)
started tasks, where STC can be changed to any
1 - 4 character length string. Tip: Retain the AUI prefix to simplify task identification.
- Configure the agent by customizing the configuration file, customizing the agent JCL, and starting the agent.
- Set up the IMS environment for auditing by customizing the IMS cataloged procedure, configuring IMS exits, customizing IMS to use an IBM System z® Integrated Information Processor (zIIP), and review the related security considerations.
Note: No WLM (Workload Manager) considerations are necessary.
All agent started tasks use the STC WLM class.