Before you can use IMS TM or IMS DB, you must define the elements and functions that make up the IMS system, including:
IMS provides macros and procedures that enable you to define your system. IMS also provides user exits that enable you to customize processing. A user exit is the point in IMS's code at which an exit routine can be given control. To define an IMS system, you can either customize the sample IMS system that is verified with the IVP (see "IMS Installation Verification Program (IVP)" on page 50), or copy the sample IMS system and customize the copy for your installation. Related Reading: For more information about the IMS definition process, see Chapter 19, "The IMS System Definition Process," on page 329 and IMS Version 9: Installation Volume 2: System Definition and Tailoring. For more information about the IMS user exits, see Chapter 20, "Customizing IMS," on page 347. Setting up security for the IMS system is also part of the system definition process. IMS has its own built-in security functions and can provide more extensive security through employing user-written exit routines, a security product (such as RACF), or both. Related Reading: For more information about IMS security, see Chapter 21, "IMS Security," on page 361. For complete information about IMS security, see IMS Version 9: Administration Guide: System. |