Considering other access control methods
Use other access methods to augment your security software.
- Physical security
You should consider physical security measures that support your system security. - Using display bypass and password masking in DB/DC and DCCTL
IMS does not provide a software function to blank out or obliterate passwords from the terminal device display media after they are accepted. However, Message Format Service (MFS) facilities enable users to define fields with a non-display attribute (for 3270 display devices). IMS removes passwords from messages prior to recording them on the log. - Protecting your resources
You can protect IMS system libraries and data sets, as well as VSAM, OSAM, and Fast Path databases, in both the online (DB/DC, DBCTL, and DCCTL) and batch environments.
Parent topic: IMS security