IMS Security


Effective and efficient database security is an essential in all organisations. This course, taught by experienced IMS specialists, introduces and explains how to implement RACF with IMS.
The course is available on demand for public presentations (both at High Wycombe and over the Internet via RSM's Virtual Classroom Environment service.
This course is also available for one-company, on-site presentations or one-company presentations over the Internet, via RSM's Virtual Classroom Environment service.

Objectives

On successful completion of this course you will be able to:

  • identify the IMS resources that must be protected
  • iIdentify the types of security facilities available for each resource
  • develop a plan to implement security on your IMS systems
  • identify the tasks required in IMS and RACF to implement security
  • implement security for each resource using an appropriate security facility
  • code the security definitions in IMS and RACF to protect transactions, commands, data, dependent regions, Program Specification Blocks (PSB), terminals and other resources.

Who Should Attend

Security administrators and IMS systems programmers.

Prerequisites

A conceptual and terminological understsnding of both IMS and RACF. This skills can be gained by attendand on the courses IMS Essentials and Understanding EACF.

Duration

4 days

Fee (per attendee)

£2380 (ex VAT)

Course Code

IMSE

Contents

Introduction to IMS Security

IMS Security Facilities

IMS Security Options

Introduction to RACF

User ID and Sign On Verification

Securing the IMS Control Region

IMS Transaction Security

IMS Command Security

Security for Time Controlled Operations

IMS Resource Access Security (RAS)

IMS Database Security

MS Dataset Security

Common Service Layer Security

Security in an IMS Database Control Environment

IMS and Db2 Security


© RSM Technology 2018