Controlling DBCTL security violations

Security violations are handled according to the installation's security administration guidelines.

IMS records the following security violation attempts on the IMS system log:

Any of these errors causes IMS to log the violation. The IMS system log provides an audit trail for investigation of possible security problems. The IMS system log security violation is identified as a X'10' log record type. You can use the File Select and Formatting Print utility to print the log.

Another method for recording security violations is available when RACF® is installed. Each resource access violation creates a RACF type 80 record.

Related reading: