Handling security in the RMGR environment
Standard security methods are used to secure RMGR components and to allow RMGR and its users to access IMS and other resources in the environment.
This section contains the following topics:
Related topic
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*