Kisco Systems

IBM i Security Tips

Home : Blog : System Values

System Values

Security Levels for IBM i

Your very first and probably most basic decision about security on your system is found in the setting for the QSECURITY system value. You can see your current security level setting by running the "Display Security Attributes" (DSPSECA) command.

Read more


Network Attributes and IBM i Security

There are some simple network attribute settings that you can use to implement controls. You can view the network attribute settings on your system using the Display Network Attributes (DSPNETA) command and make changes using the Change Network Attributes (CHGNETA) command

Read more


Library List Security - Part 2

The user library list is maintained as system value QUSRLIBL. This is a list of libraries that will always be present for all users of your system at signon time.

Read more


Library List Security - Part 1

he library list on your IBM i controls how the IBM i OS searches for objects when no specific library has been coded. Changes to the library list could easily be used to execute a rogue program or cause your processing to run against an incorrect set of data.

Read more


Standardize Security Across Multiple Systems

Nothing supports the popularity of the IBM i as much as the number of customers with multiple systems installed. These can be either multiple partitions on a single box or separate boxes. For security officers, this can easily mean a lot of extra work keeping each system setup and configured for company security policies.

Read more


Securing Your IBM i Production Files

You will find a lot written about advanced topics in security for your IBM i, but if you don't have basic object level security in place, all the advanced topics in the world may be a complete waste of time. This tip will explore the basics of how to best secure native objects, including your data files, on your IBM i.

Read more


Setting and Locking Your System Values

System values define global, system-wide settings on your IBM i platform. Many of these system values pertain to how you want to implement system security. This tip will review how to look at these settings and then, how to lock them in place so that they cannot be changed.

Read more


Custom Password Validation Program

While the IBM i operating system has very good features for controlling password selection, sometimes your password policy just can't be enforced without additional checking. You may have a list of reserved words that you specifically do not want anyone using as a password. Or, you may have some very stringent requirements that are just not covered by the system values that control password assignment in IBM's i/OS.

Read more


Lock Up Your System Values

System values define global, system-wide settings on your IBM i platform. Many of these system values pertain to how you want to implement system security. This tip will review how to look at these settings and then, how to lock them in place so that they cannot be changed.

Read more


Watch Your System Values

Since the system values control how your system works, it is important that they be set correctly and that you know what those settings are. Here's what could happen if you are migrating to a new system.

Read more