Customizing the ZDT/IMS security environment

This chapter describes:
  • How you can control access to the ZDT/IMS functions and IMS™ subsystems.
  • How you can use user-written security exit routines to control access to various IMS resources.