Q
Problem solve Get help with specific problems with your technologies, process and projects.

How much authority should be given?

What authority should we give company subsidiaries overseas? There is this user ID "ABC" that has the authority of *SPTCTL. This ID has been used by one of our company subsidiaries overseas to FTP files into our iSeries. Our auditor recommends that we not allow this to happen. We understand that this authority can be used to view, change or delete spool files.

We do not know what authority should be given to this user ID for our overseas counterpart. According to our overseas counterpart person in charge, this user ID does not use this ID to log into our system -- unless it's being abused. He states that it is an ID used to FTP files between the SFT and iSeries. Therefore, the usage should be internal within our network.


I would simply remove *SPLCTL and use the freeware FTP secure system from Easy400 available here.

==================================
MORE INFORMATION ON THIS TOPIC
==================================

The Best Web Links: tips, tutorials and more.

Ask your OS/400 questions -- or help out your peers by answering them -- in our live OS/400 discussion forums.

Ask the Experts yourself: Our OS/400 gurus are waiting to answer your questions.

Check out this Search400.com Featured Topic: Top 10 expert tips for OS/400


This was last published in January 2004

Dig Deeper on Past Releases

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

Close