Securing DB/DC and DCCTL dependent regions and their resources
It is important to protect dependent regions. There are two approaches to securing a dependent region: preventing the unauthorized scheduling of application programs in the dependent region and preventing the unauthorized use of resources by those programs after they have been scheduled.
The following list describes the different types of dependent regions and the resources that can be protected for each:
- For BMP regions:
- Transaction codes
- PSBs
- Logical terminals or transaction codes that are specified by using the OUT= keyword of the IMSBATCH procedure
- For IFP regions: PSBs
- For JBP regions:
- PSBs
- Logical terminals or transaction codes that are specified by using the OUT= keyword of the DFSJBP procedure
- For JMP regions: transaction codes
- For MPP regions: transaction codes
IMS supports Resource Access Security (RAS) to protect dependent regions.