For procedures to implement the security concepts described in this section, see Configure security between i5/OS and hosted systems. There are several types of security to consider.