Your very first and probably most basic decision about security on your system is found in the setting for the QSECURITY system value. You can see your current security level setting by running the "Display Security Attributes" (DSPSECA) command.
There are some simple network attribute settings that you can use to implement controls. You can view the network attribute settings on your system using the Display Network Attributes (DSPNETA) command and make changes using the Change Network Attributes (CHGNETA) command
The user library list is maintained as system value QUSRLIBL. This is a list of libraries that will always be present for all users of your system at signon time.
he library list on your IBM i controls how the IBM i OS searches for objects when no specific library has been coded. Changes to the library list could easily be used to execute a rogue program or cause your processing to run against an incorrect set of data.
Nothing supports the popularity of the IBM i as much as the number of customers with multiple systems installed. These can be either multiple partitions on a single box or separate boxes. For security officers, this can easily mean a lot of extra work keeping each system setup and configured for company security policies.
You will find a lot written about advanced topics in security for your IBM i, but if you don't have basic object level security in place, all the advanced topics in the world may be a complete waste of time. This tip will explore the basics of how to best secure native objects, including your data files, on your IBM i.
System values define global, system-wide settings on your IBM i platform. Many of these system values pertain to how you want to implement system security. This tip will review how to look at these settings and then, how to lock them in place so that they cannot be changed.
While the IBM i operating system has very good features for controlling password selection, sometimes your password policy just can't be enforced without additional checking. You may have a list of reserved words that you specifically do not want anyone using as a password. Or, you may have some very stringent requirements that are just not covered by the system values that control password assignment in IBM's i/OS.
System values define global, system-wide settings on your IBM i platform. Many of these system values pertain to how you want to implement system security. This tip will review how to look at these settings and then, how to lock them in place so that they cannot be changed.
Since the system values control how your system works, it is important that they be set correctly and that you know what those settings are. Here's what could happen if you are migrating to a new system.
RECENT POSTS
CATEGORIES