Customizing the FM/IMS security environment

This chapter describes:
  • How you can control access to databases when functions are run in BMP mode or DLI mode.
  • How you can control access to the FM/IMS functions and IMS subsystems.
  • How you can use user-written security exit routines to control access to various IMS resources.