Loading…
Attending this event?
THE BEST IBM i & POWER SYSTEMS EDUCATION.When you come to POWERUp, you’ll be able to customize your experience. Choose from 300 sessions, covering over 20 areas of IT, when you plan your schedule. Visit the largest Expo of its kind and meet the experts behind the solutions. Attend social events to meet renowned speakers and peers alike. This conference is structured to give you the pure education and professional connections needed to best enhance your career. Are you ready to POWERUp?

Exhibitor Hall: https://www.expocad.com/host/fx/common/s24/exfx.html
Tuesday, May 21 • 5:50pm - 6:10pm
284: Object-level Authorities by Application, with Automation

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

The ownership and authority privileges for all objects on the system are gathered and summarized for review; SQL code is set to identify when objects in the application don’t follow preset authorities; and code to automate the maintenance of ownership and authorities in a fast-paced development environment. Ownership and public authorities are critical elements of a secure environment.

Learning Objectives:
We will review sample application authorities, and the code that drives the creation of an application_authorities table. We review a few of the methods to categorize libraries for ownership and authority maintenance. Finally, a second SQL set of stored procedures are presented to maintain authorities on a schedule basis.

Speakers
avatar for Tim Hawkins

Tim Hawkins

System Admin, Tanimura & Antle
When GPT3.5 is asked "What could AGI mean for computer security?"-- responseArtificial General Intelligence (AGI) could have significant implications for computer security:Enhanced Threat Detection: AGI systems could be trained to identify even the smallest behaviors of ransomwar... Read More →



Tuesday May 21, 2024 5:50pm - 6:10pm CDT
Meeting Room 101 1508 Houston St, Fort Worth, TX 76102
  Security
  • Session Level All
  • Audience System Administrators who will be attending the “Using SQL to drive IBM i Security scans” session; or who need to know about application authorities in-use on their system.