Manage Learn to apply best practices and optimize your operations.

Seven ways to secure powerful profiles

Here's a few more things to think about in addition to System Value Security Settings.

An addition to System Value Security Settings:

-Expire after 60/90 days
-Minimum/maximum length
-Disable and vary off after three attempts
-Digits in password
-Limit characters
-Limit repeating characters
-Duplicate password control

Due to publishing password rules/restrictions for our users, I deviate from these values when setting passwords for powerful profiles such as QSECOFR. I use passwords that contain limited characters, longer than maximum, repeat characters, set the profile to limit device sessions and audit for password failures. In addition, IBM profiles are never used when initially accessing remote systems.

==================================
MORE INFORMATION ON THIS TOPIC
==================================

The Best Web Links: Tips, tutorials and more.

Search400.com's targeted search engine: Get relevant information on security.

Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.

Read this Search400.com Featured Topic: Secure your iSeries


Dig Deeper on iSeries system and application security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchDataCenter

Close