Manage Learn to apply best practices and optimize your operations.

Seven ways to secure powerful profiles

Here's a few more things to think about in addition to System Value Security Settings.

An addition to System Value Security Settings:

-Expire after 60/90 days
-Minimum/maximum length
-Disable and vary off after three attempts
-Digits in password
-Limit characters
-Limit repeating characters
-Duplicate password control

Due to publishing password rules/restrictions for our users, I deviate from these values when setting passwords for powerful profiles such as QSECOFR. I use passwords that contain limited characters, longer than maximum, repeat characters, set the profile to limit device sessions and audit for password failures. In addition, IBM profiles are never used when initially accessing remote systems.


The Best Web Links: Tips, tutorials and more.'s targeted search engine: Get relevant information on security.

Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.

Read this Featured Topic: Secure your iSeries

Dig Deeper on iSeries system and application security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.