Security for AO application programs

Automated operator (AO) application programs can issue a subset of IMS™ operator commands. Because an operator command can compromise a security profile, you should prevent AO application programs from issuing sensitive commands that might modify IMS resources.

There are two types of AO application programs: type-1, which uses the CMD call to issue commands in DB/DC and DCCTL environments, and type-2, which uses the ICMD call to issue commands in DB/DC, DCCTL, and DBCTL environments. Your options for implementing security differ slightly between commands issued using CMD calls and commands issued using ICMD calls.

For both CMD and ICMD calls you must specify which security facilities will enforce AO security and then tailor the system definition macros and startup procedures to work with your security facility choices.

Related reading: For more complete information about AO applications, see IMS Version 13 Operations and Automation.