I just get a new job as iSeries administrator. Our company has an iSeries 720 -- we may upgrade soon and get two...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
machines. The problem is no security policies exist. Now on our iSeries we share product and development environment. Can you help me with some advice, maybe a sample plan that we can use as reference?
For a good set of recommendations you might try starting with the Security Wizard available through Operations Navigator (now called iSeries Navigator). Expand on the system name, then right click on Security, choose Configure and you will be brought into the Security Wizard. If you don't use OpsNav, you can get the same set of recommendations through a security planner found at here. The benefit of going through this interface is that you can obtain recommendations for AIX, OS/390 and Windows as well as OS/400. You can also obtain network recommendations for each platform.
In addition to these recommendations, I recommend that you resist the temptation to allow developers to have *ALLOBJ special authority even though development will now take place on a separate system. In addition, if you have not already done so, make sure you implement a good change management system.
MORE INFORMATION ON THIS TOPIC
The Best Web Links: tips, tutorials and more.
Search400's targeted search engine: Get relevant information on security.
Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.
Dig Deeper on iSeries system and application security
Related Q&A from Carol Woodbury
Before changing password levels and upgrading operating systems on the AS/400, ensure the clients connecting to the NetServer do not need the old ...continue reading
Look in the audit journal (QAUDJRN) on the AS/400 for an authority failure message with the name of the library as the object name. Use the ...continue reading
When error messages arise concerning attempts to use a permanent system object without authority, find the source of the issue by looking for an AF ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.