EasyManuals Logo

IBM i Series Handbook

IBM i Series
908 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #483 background imageLoading...
Page #483 background image
Operating System/400 (5722-SS1) 453
Operating System/400 (5722-SS1)
• HTTP server powered by Apache for iSeries (5722-HT1)
• WebSphere for iSeries (V4R4) (5722-WA1)
• Network Security is integrated
• Lightweight Directory Access Protocol (LDAP) on the iSeries
• Virtual Private Networks
Network Management Facilities
Several communications and systems management functions are available to manage the
iSeries servers. Some are integrated into Operating System/400, and some are
separately-priced features. These functions help manage and control local systems and
distributed systems that may operate within a network controlled by a host System/370 or by
another iSeries server.
Functions available for the iSeries server are:
• Systems Management in TCP/IP Networks
• Alerts support to NetView, System/36, System/38, AS/400
• Distributed System Node Executive (DSNX)
Security
Comprehensive Security for System Resources
The many levels of security available with OS/400 ease the job of system security
management. The level of security is set simply using a system value, as shown in the
following table.
Security
Level
Description Use of this Level Considerations
10 Minimal security No passwords are used. Any user can perform any function.
20 Password security Passwords are used to provide
access to the system.
Any user can perform any function once
they are signed on.
30 Resource security Passwords are required and object
usage can be controlled.
Users can be restricted to specific
functions.
40 Resource security
and operating system
integrity
Passwords are required and object
usage can be controlled. Users can
be restricted to specific functions.
Using unsupported interfaces is
restricted.
50 Enhanced resource
security and operating
system integrity
1
Passwords are required and object
usage can be controlled. Users can
be restricted to specific functions.
Using unsupported interfaces is
restricted.
Parameter validation into the operating
system and restrictions on use of user
domain objects. A security journal is
provided that logs all security violations.

Table of Contents

Other manuals for IBM i Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the IBM i Series and is the answer not in the manual?

IBM i Series Specifications

General IconGeneral
Operating SystemIBM i
Form FactorRack, Tower
StorageSSD and HDD options
Securitycompliance
VirtualizationIBM PowerVM
CPUPOWER processors
ScalabilityScale-up

Related product manuals