Controlling DBCTL security violations
Security violations are handled according to the installation's security administration guidelines.
IMS records the following security violation attempts on the IMS system log:
- Password omitted when one is required
- Password incorrect for authorization
- Misspelled password
Any of these errors causes IMS to log the violation. The IMS system log provides an audit trail for investigation of possible security problems. The IMS system log security violation is identified as a X'10' log record type. You can use the File Select and Formatting Print utility to print the log.
Another method for recording security violations is available when RACF® is installed. Each resource access violation creates a RACF type 80 record.
Related reading:
- For more information on the File Select and Formatting Print utility, see IMS Version 15.4 System Utilities.
- For more information on utilities to format and print RACF records, see z/OS® Security Server RACF Auditor's Guide.