CMW43G: Implementing IMS Security

IBM Systems Training

on July 29, 2022

      

3 min read

––– views


Table of Contents

  1. Short Summary
  2. Duration
  3. Content Description
  4. Objectives
  5. Agenda
  6. Audience
  7. Skill Level
  8. Labs?
  9. Keywords
  10. Prerequisites
  11. Enrollment
  12. Errata
  13. Follow-on Courses

Short Summary

This course is taught in a web conference medium with live instructor audio, and internet web conferenced materials. Students have chat type Q and A ability, plus live audio.

Duration in Hours ⌚

32

Content Description

Learn implementation for Information Management System (IMS) using Resource Access Control Facility (RACF) as the external security manager, and the installation provided security exit routines. Apply classroom lectures with security workshop exercises in which you setup the security definitions.

This course is taught in a Web conference medium with live instructor audio, and Internet Web conferenced materials. You have chat type Question and Answer (Q and A) ability, plus live audio. The course is taught 10:00 a.m. to 12 noon and 1:00 p.m. to 3:00 p.m. Central time for eight work days over a two week period. Since the class is taught live using Web conferencing methods, you can attend from your home or work. Class durations are approximately one-half day so you can still accommodate daily work responsibilities.

Objectives

  • Identify the tasks that must be done in IMS, RACF, and SMU to implement security
  • Develop a plan to implement security on your IMS systems
  • Code the security definitions in IMS, RACF, and SMU to protect transactions, commands, data, dependent regions, Parse Descriptor Blocks (PDB), terminals and other resources
  • Migrate from IMS internal SMU security to RACF security
  • Protect IMS system resources so IMS itself has access but others, such as Time Sharing Option (TSO) users or batch jobs, are denied access
  • Define IMS terminal users to RACF and restrict the IMS regions to which these users are allowed to sign-on

Agenda

  • Introduction to IMS Security
  • IMS Security Facilities
  • IMS Security Options
  • Introduction to RACF
  • User ID and Sign On Verification
  • Securing the IMS Control Region
  • IMS Transaction Security
  • IMS Command Security
  • Security for Time Controlled Operations
  • IMS Resource Access Security (RAS)
  • IMS Database Security
  • IMS Data Set Security
  • Common Service Layer Security
  • Security in an IMS Database Control Environment
  • IMS and DB2 Security

Audience

This is an intermediate course for security and IMS support individuals who design, implement, or administer security for IMS systems.

Skill Level

Intermediate

Labs? 💻

No

Keywords

IMS;Web;Database;Security;RACF;zos;CMW43G;CMW43

Prerequisites

You should be familiar with RACF or IMS.

Enrollment

https://www.ibm.com/training/course/CMW43G

Errata

None specified.

Follow-on Courses

None specified.


View on GitHubView on IBM website

Designed and developed by Upendra Rajan