Customizing the FM/IMS security environment
This chapter describes:
- How you can control access to databases when functions are run in BMP mode or DLI mode.
- How you can control access to the FM/IMS functions and IMS™ subsystems.
- How you can use user-written security exit routines to control access to various IMS™ resources.