For IDMS, how do we secure console operator commands?
search cancel

For IDMS, how do we secure console operator commands?


Article ID: 190522


Updated On:


IDMS IDMS - Database


Operator Console commands can be issued and are documented here:

Many of these perform the same functions as DCMT commands. How can these be secured?


Release : 19.0 & all supported releases

Component : CA IDMS/DB


Top Secret and RACF offer the ability to secure Operator commands for z/OS. This security can restrict the ability of replying to outstanding WTORs to certain users. This is implemented by not allowing access to the MVS.REPLY resource in the OPERCMDS resource class. If this security is enabled, only authorized console users will be able to reply to the outstanding WTOR for IDMS and enter IDMS operator commands.

Additional Information

Full descriptions of how to implement security within an IDMS system can be found here: \