This chapter discusses the methods available for protecting the information in a database:
The security mechanisms to restrict unauthorized access to the database:
The VTAM product supports a security exchange between two partner logical units (LUs) that are attempting to establish a session with each other. This security exchange is called partner LU verification.
The APPC/VM communications allow an application requester to specify one of the following levels of conversation security when it is trying to connect to the application server:
Use these statements to control the ability of an application requester to communicate with the application server.
Because the application server cannot differentiate between identical user IDs from local and remote systems, the ability to translate inbound user IDs to locally known ones can eliminate duplicate user IDs and avoid potential security-related problems.
Use the guidelines in this section to protect your database minidisks against unauthorized access.
Certain CMS file manipulation commands must not be used on database files because they can render the database useless.
The integrity and security of your database can be threatened if unauthorized persons have access to the console. This section discusses how to use the CP DISCONN command to restrict console access.
If VSE guest users use ISQL to access an application server on a VM/ESA operating system, you may want to limit their access.