Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Mastering IBM i Security: A Modern Step-by-Step Guide
Mastering IBM i Security: A Modern Step-by-Step Guide
Mastering IBM i Security: A Modern Step-by-Step Guide
Ebook225 pages2 hours

Mastering IBM i Security: A Modern Step-by-Step Guide

Rating: 0 out of 5 stars

()

Read preview

About this ebook

Mastering IBM i Security provides you with the how-to for using the modern interfaces provided in IBM i 7.5 and recent Technology Refreshes to manage your IBM i security configuration. Carol provides practical examples of using IBM i Access Client Solutions, including Run SQL Scripts, the New Navigator browser interface, Authority Collection, and IBM i Services to gain a better understanding of your IBM i configuration. Also included are examples of taking advantage of the new security features introduced in IBM i 7.5.While her companion work, IBM i Security Administration and Compliance, Third Edition, provides the foundational description of IBM i security, Mastering IBM i Security provides you with the how-to for discovering, maintaining, reporting on, and successfully changing your IBM i security configuration. Throughout the book, Carol provides expertise from her 20+ years of consulting to successfully use modern technologies to perform the investigation required for tasks such as securing objects, removing users' excess capabilities, moving the system to a higher security level, moving the system to a higher password level, securing SSH, securing the IFS, reducing the risk of malware infection, and more. Also included are tips for successful implementation and warnings about what might break.Throughout Mastering IBM i Security, Carol will introduce you to new methods (such as IBM i Services) and interfaces (such as New Navigator) to perform tasks that you would normally address using traditional CL commands. Tasks such as viewing audit journal entries, Authority Collection information, and user profile settings have new and fresh interfaces, making them easier to understand and consume, whether youà ¢ â ‚ ¬ â „ ¢ re new to the system or an expert.Mastering IBM i Security is an insight into and a guidebook for the methods and techniques Carol uses to help her clients successfully achieve their IBM i security goals.Upon completion of this book, you will be able to/you will:- Gain knowledge about the new security features of IBM i 7.5 and recent Technology Refreshes- Get practical advice on successfully moving your system to a higher password level- Gain practical insights into investigating system value, user profile, and object authority settings using IBM i Services (downloadable SQL for your use and customization is included)- Understand how to use Authority Collection to successfully reduce users' authority (such as *ALLOBJ)- Understand how to use Authority Collection to successfully secure objects (in both libraries and directories)- Understand the steps you can take to secure the IFS and reduce the risk of malware infecting the system- See how you can use New Nav to check and maintain your security configuration as well as view audit journal entries and Authority Collection information- Understand the steps to take to successfully move the system from QSECURITY level 20 to 40 or 30 to 40- Understand how to limit who can use SSH- Understand how to use the audit journal as an early warning to an intrusion
LanguageEnglish
Release dateAug 1, 2022
ISBN9781583479025
Mastering IBM i Security: A Modern Step-by-Step Guide

Read more from Carol Woodbury

Related to Mastering IBM i Security

Related ebooks

Security For You

View More

Related articles

Reviews for Mastering IBM i Security

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Mastering IBM i Security - Carol Woodbury

    cbook_preview_excerpt.html\rvVT/$QAʢM@OƠ9B~?<$yHU~#/Zg+*^{ ej7o2w.JlO.UCT-WǪ.f7Zc`!ہ]n|!-<~gTئNtTntV~*y\&78[V6ce3UΌY~4BྺB-Qj]Z)~]i1Z$S:(8r^QnTja$ws@+f&Rt3;r/*=U.SC45:U ʙWuVč9 M\>3ɯs!=eRؤ'bJGf6I\>X!wfi ͸FnZƵ&J"7e|od .K!ͩ۶9.ۢT3]@԰,H @PYW`zoC U9c2Wi!,idDa.jnh 0= yM 6Kj ܖeT-knIPc3]AAVɒPIU@ZE.u2'xCpyr۬'h.q=?GO}up5yÞh@Op/&+a jR-^TRX֌h\,};S)'=JŬ=VMh)tV[iꦮؒeNb3 j1Zjq&+}"p91pӓ[r{Ko?Յͪ"N> /?ހz ~j7ZdBhS aA71ՇXL8 TɋzrM&]+͎m!28rfc\V!DU"HY#novuJ3@*<\z=-q,t^ڤJĒKz[!RIe*M(SudJbkO]\ 3q0G(枘g_}J+zo|>XCG8U_x}b_=W}ZxHT=D.aG_?S_}+(\:J@-\:+=/[vcq*x!gRhvE. Ƽ;2 55~v1RPz`|&D!b"ae@cḣMjmK"-NgXnGcqy,gU yI<BML0TSdbXRI0D[DmAX߲QW|TTHũA7Z3Nlx ww`i]Xo7-q_/.f`F ,Q2G-Cf=;L}z6U}k5T'8|3Ѝá UlE]JI݂>[O+/OiJgKXR޾G}^:ޛZKL)Ֆો'hfA1Q@t@4DHCvNc4b1 ;4_(;W.*$0lWUP(`JƤPqGX:1YsZ{IgEyug26CR_% -ƻ@DF[&%-:w!sujM|0%PYdd(Ȗ9l| քH]s+LkrOYNCzJ 9bY%cd;q<ǬIOC oN#2_ƃ{CIt)p~)D>+I,5Ჱ_+TէE9'm^+rнm|\݌c?\ʽaY1gZhI0!f|=Θ0@WY(a>IP߻Y~"̗6bE!|H2s9"EZ j@:N .Ax$Q/n% }6=6#tux'k%|p3^[ WYc `d*YH3f?"k<%B1̻}9eHT<FH3 f>b" 9@$)c@O`y_ Ϙ.m`JX9ҔYkٯ9D0hbG?ۗ`S01oA:uㆩ0fO(9)lÕ}u;icr/& Ą]ۀX=EÒK:[%3f*[]lŖnȐ]kښfDE@R,Ǜ[4e3.A~?5 A!+JhEN 7d`wc w,E?(vח< %ޞ&'^UidDpXN[g[0O |ΛPWEZb{#DFW3BWo~0ﳱ ୌo^$m'&\-vu!x2@$=3xz&VG܌>+Sȇ`e-y#<:.(90,Ajh2s gl#xÉ/\]!=˴H,"?F|8VL<+IY%wcA6d{J/ P.x3:Ʃ{3~>8v0  =?nW9{a(~݁6Fl?S\ EK:=bۣc5!'qvl;8yxrU7M88o鮱4A:pS#Gjrxq.]LZG"* M('č\潊9ogF!w^u\h+7aSǃ:NTzǰOzJWpP֖g|_bHHE ≝Vbߠ"^ƽ;8VϠԙ7aP4 vtdaw5IՉ]l[ x=r؀E UmŦ]:~{Om8 G Tm{zB/~ZtdEv^AvtpsIӮD,BvlAc`y b8e`?Wnir߭×Zx^`}*CL)c 9%]bԫDЊ=QuߜI>%:"6ymcԽbtwRAU=(!bpAāo[֮!׹Et9+E~D$ w"/Xcud5 Ď:]5o&C3Ùη qrZw]/c!%;HFoDMr*ㅫȜk0-ίC+?g;);:[ .Uܯ/E 80J6oRE/[伏j^{Oy02nn'gޛnK]Ia03I]k7$vE t=LwC]<Sy읟vcNnCˇ_' E}h5Q Y%4Hʁ4vttT^;4s3>8VD68 f<-!i0.)9>w)1:Qvfz,W&D_;AWYBjfm> o7y,~z4ĨXO_(5 .jxܙs$m7ݼbr.]}+IMgXTMΤ'ٳ/^زD=RIɛ{)4:\M6MBB@ . «qB _[kp.E<<\]]lѦ߲;6@5;uoy|H%*$~w^ٷٺC "tX_YYZVou.8Ȭ}}sQn"n\gڸЍ;3aT^in 0kx{Cyn7M(Ҥl옒n2"zyG.k7z(43WŴG,A(9[!=E| jԍ~3(6c\Kje|U2id#4$q%%a'[`l>7Jhy7oaZowwdz7VwIŕ}u}f&_RI_jL&RIG_kЄ[Hk*6Ŕ$f"M{{PFU~ۑi7ug9jQ* 7QkH^ͻi[73Z4!ih^(i` ts*1A~Vدz/-h5l}w2#DžogmUœ*9T2*8/nz)ҽ.ل4_M~`yVab~
    Enjoying the preview?
    Page 1 of 1