Security considerations for using IBM MQ with IMS
Use this topic to plan your security requirements when we use IBM MQ with IMS.
Use the OPERCMDS class
If you are using RACF® to protect resources in the OPERCMDS class, ensure that the userid associated with your IBM MQ queue manager address space has authority to issue the MODIFY command to any IMS system to which it can connect.
Security considerations for the IMS bridge
There are four aspects that you must consider when deciding your security requirements for the IMS bridge, these are:When you define your security requirements for the IMS bridge you must consider the following:
- What security authorization is needed to connect IBM MQ to IMS
- How much security checking is performed on applications using the bridge to access IMS
- Which IMS resources these applications are allowed to use
- What authority is to be used for messages that are put and got by the bridge
- Messages passing across the bridge might have originated from applications on platforms that do not offer strong security features
- Messages passing across the bridge might have originated from applications that are not controlled by the same enterprise or organization