+

Search Tips | Advanced Search

Security considerations for using IBM MQ with IMS

Use this topic to plan your security requirements when we use IBM MQ with IMS.


Use the OPERCMDS class

If we are using RACF to protect resources in the OPERCMDS class, ensure that the userid associated with the IBM MQ queue manager address space has authority to issue the MODIFY command to any IMS system to which it can connect.


Security considerations for the IMS bridge

There are four aspects that we must consider when deciding your security requirements for the IMS bridge, these are:

  • What security authorization is needed to connect IBM MQ to IMS
  • How much security checking is performed on applications using the bridge to access IMS
  • Which IMS resources these applications are allowed to use
  • What authority is to be used for messages that are put and got by the bridge

When you define your security requirements for the IMS bridge we must consider the following:

  • Messages passing across the bridge might have originated from applications on platforms that do not offer strong security features
  • Messages passing across the bridge might have originated from applications that are not controlled by the same enterprise or organization

Parent topic: Set up security on z/OS

Last updated: 2020-10-04