Kisco Systems

Kisco U

Activation schedules

Home : Kisco U : Activation schedules

Use activation schedules to limit the potential impact of a compromised user profile. If a user profile is compromised and the compromised activity is attempted outside of regular working hours then the break-in will not be successful at that time.

The IBM i OS "Activation Schedule" feature lets you specify what days and what hours in the day that a user profile can be used. This extends not only to terminal session signon but to all server activity, such as FTP, the system file server, etc.

Two commands are used to maintain the system Activation Schedule:

  • "Change activation schedule entry" (CHGACTSCDE) is the main command for maintaining the schedule. Use this command to add a user profile to the list or change a profile that is already on the list. Once a profile is on the list, a message will be sent to the user profile that established the entry each time the profile is activated and deactivated.

  • "Display activation schedule" (DSPACTSCD) is used to review how your Activation Schedule is set up. You can look at it interactively or create a report of the schedule.

Exit points for time-of-day control

Use IBM i exit points to implement granular "time of day" access controls to specific network connected services.

Our SafeNet/i product includes this functionality out of the box for all relevant OS exit points.