IBM i Access Management

IBM i
Access
Management

Security experts continually recommend that the “rule of least privileges” is the best approach for user data access control. The reality is though that most users have access to far more information than they need. While excessive user privilege is a significant security risk, there is an often valid argument that tightening security too much results in people not being able to do their job. Furthermore, from time to time users often have valid reasons for needing temporary access to elevated privileges to perform certain tasks.

Security Features

The creation and management of user profiles on the IBM i and their access to objects is fine grained and powerful – however, it is also rather cumbersome and manual, and lacks a lot of features that would save administrators a lot of time.

Working with our partners, JouleTech has solutions that simplify and enhance the management of user access to data. Some of the features these solutions can bring to your organisation include:

  • Simplified user profile creation and management
  • Temporary profile privilege elevation management, including auditing and multi-level approval processes
  • Password Self Help – Enable users to reset password and re-enable disabled profiles
  • Incorporate 2FA (2-Factor Authentication) capabilities
  • Auditing of user activities as and when required when using applications, SQL, DFU, SST, QSHELL, and DBU.
  • And much more …

Contact Us for more information

IBM i NETWORK SECURITY

The days of an AS/400 only being accessed by dumb terminals are long gone. With the opening up of progressivly more capable versions of the AS/400, todays’ evolution, the IBM i, now has a far greater number of entry points into the server – thus increasing the number of doors that malicious intruders may enter – FTP, ODBC, JDBC, SQL, and Remote Control, to name a few.

Aside from managing legitimate user access to information, IBM i administrators must also now establish measures to thwart assaults on to their systems from external individuals and agencies.

Working with our business partners, JouleTech has networks security solutions to help you to control, monitor, audit, and restrict access to your IBM i exit points, empowering you to limit data access to only those who are authorised to it.

Contact Us for more information