Designing security for IMS DB/DC and DCCTL

This topic explains how the various types of IMS security can be used. When you are considering each part of your security design, consider the physical actions that a user must take to obtain access to the system. You probably will use more than one type of security checking.

This topic assumes the following control points for security:

This section also assumes that you will use the Resource Access Control Facility (RACF®) security product, which is licensed with the z/OS® operating system. RACF is external to IMS.