This document discusses best practices for configuring IBM z/OS Connect and IBM IMS to meet security audit requirements. It presents five scenarios for authentication and authorization: 1) Using a shared ID with IMS Connect and RACF=Y, 2) Using the client ID with IMS Connect and RACF=N, 3) Mapping the client ID to a RACF ID with IMS Connect and RACF=Y, 4) Using a client UToken in the future, and 5) Using the client user ID and password with RACF=Y. Each scenario outlines how the client identity would propagate from z/OS Connect to IMS Connect and IMS.