Come to this session to learn the basics of IBM i Security. During this session Carol will cover the three building blocks of IBM i Security - Security-relevant System Values, User Profile Configuration and Object Security. Carol will also describe how (the order) the system checks security as well as program adoption. This session builds the foundation for other topics discussed during the rest of the conference. Emphasis will be placed on using modern interfaces (Navigator for i, IBM i Services, etc)
Learning Objectives:
- Understand the functions provided by security-relevant system values
- Know which attributes of the user profile contribute to the capabilities of the user and understand the best practices settings for these attributes
- Understand the options available for setting authority on objects (files, programs, etc)
- Know the order in which IBM i checks authority when a user accesses an object
- See how you can create and manage user profiles, system values and permissions in New Navigator