EasyManua.ls Logo

IBM i Series - Security

IBM i Series
908 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Operating System/400 (5722-SS1) 453
Operating System/400 (5722-SS1)
HTTP server powered by Apache for iSeries (5722-HT1)
WebSphere for iSeries (V4R4) (5722-WA1)
Network Security is integrated
Lightweight Directory Access Protocol (LDAP) on the iSeries
Virtual Private Networks
Network Management Facilities
Several communications and systems management functions are available to manage the
iSeries servers. Some are integrated into Operating System/400, and some are
separately-priced features. These functions help manage and control local systems and
distributed systems that may operate within a network controlled by a host System/370 or by
another iSeries server.
Functions available for the iSeries server are:
Systems Management in TCP/IP Networks
Alerts support to NetView, System/36, System/38, AS/400
Distributed System Node Executive (DSNX)
Security
Comprehensive Security for System Resources
The many levels of security available with OS/400 ease the job of system security
management. The level of security is set simply using a system value, as shown in the
following table.
Security
Level
Description Use of this Level Considerations
10 Minimal security No passwords are used. Any user can perform any function.
20 Password security Passwords are used to provide
access to the system.
Any user can perform any function once
they are signed on.
30 Resource security Passwords are required and object
usage can be controlled.
Users can be restricted to specific
functions.
40 Resource security
and operating system
integrity
Passwords are required and object
usage can be controlled. Users can
be restricted to specific functions.
Using unsupported interfaces is
restricted.
50 Enhanced resource
security and operating
system integrity
1
Passwords are required and object
usage can be controlled. Users can
be restricted to specific functions.
Using unsupported interfaces is
restricted.
Parameter validation into the operating
system and restrictions on use of user
domain objects. A security journal is
provided that logs all security violations.

Table of Contents

Other manuals for IBM i Series

Related product manuals