ORPP logo
Image from Google Jackets

Managing OS/400 with Operations Navigator V5R1, Volume 2 : Security.

By: Material type: TextTextPublisher: Durham : I B M, 2003Copyright date: ©2003Edition: 1st edDescription: 1 online resource (154 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780738427515
Subject(s): Genre/Form: Additional physical formats: Print version:: Managing OS/400 with Operations Navigator V5R1, Volume 2LOC classification:
  • QA76.76.O63 -- M36 v.2 2003eb
Online resources:
Contents:
Front cover -- Contents -- Notices -- Trademarks -- Preface -- Redbook series overview -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. Security overview -- 1.1 iSeries security overview -- 1.2 OS/400 security overview -- 1.2.1 User profile user class and special authorities -- 1.2.2 Object security -- 1.3 iSeries TCP/IP networking security -- 1.4 Operations Navigator interfaces to iSeries security -- Chapter 2. Security policies and authorization lists -- 2.1 Operations Navigator Security component -- 2.2 Authorization lists -- 2.2.1 New authorization list example -- 2.2.2 Adding users to an authorization list example -- 2.2.3 Adding an authorization list to secure an object example -- 2.2.4 Display an authorization list's secured objects example -- 2.2.5 Authorization list and group profile comparison -- 2.3 Auditing policy -- 2.3.1 System policy properties -- 2.3.2 Journaling -- 2.3.3 New objects -- 2.4 Password policy -- 2.5 Security policy -- 2.6 Sign-on policy -- 2.7 Security wizard -- 2.7.1 Security wizard output options: Administrators or system users -- Chapter 3. Users and groups -- 3.1 Users and groups overview -- 3.1.1 My Connections Users and Groups overview -- 3.1.2 Management Central Users and Groups overview -- 3.1.3 What is an OS/400 user profile? -- 3.2 User Profile administration -- 3.3 Creating user profiles -- 3.3.1 New user -- 3.3.2 New Based On feature -- 3.3.3 User definition -- 3.4 Changing users -- 3.4.1 Properties -- 3.4.2 Changing a user's password -- 3.4.3 Edit a user/group -- 3.5 Distributing a user profile on another system -- 3.5.1 Send from user inventory -- 3.5.2 Drag and drop -- 3.6 Deleting users -- 3.7 Searching for users and user information -- 3.7.1 Basic search -- 3.7.2 Advanced search -- 3.8 Groups -- 3.8.1 Creating a group profile.
3.9 Users not in a group -- 3.10 User properties -- 3.10.1 User properties: Groups -- 3.10.2 User properties: Personal -- 3.10.3 User properties: Capabilities -- 3.10.4 User properties: Jobs -- 3.10.5 User properties: Networks -- 3.11 User objects -- 3.11.1 Scan for Owned Objects function -- 3.12 Security requirements for user and group administration -- Chapter 4. Permissions examples -- 4.1 Using Operations Navigator permissions to secure objects -- 4.2 File system level permissions -- 4.2.1 Permissions for the QSYS.LIB file system -- 4.2.2 Permissions for the QDLS file system -- 4.3 Object level permissions within a file system -- 4.3.1 Changing permissions for a QSYS.LIB object -- 4.4 Security needed for changing permissions -- 4.5 Authority required to display permissions -- Appendix A. System values -- Using online help to find system value details -- Using Information Center for system value information -- Appendix B. OS/400 object and data permissions -- General authority and permission terms reference -- OS/400 object authority "shortcut permission" cross-reference -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Index -- Back cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Front cover -- Contents -- Notices -- Trademarks -- Preface -- Redbook series overview -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. Security overview -- 1.1 iSeries security overview -- 1.2 OS/400 security overview -- 1.2.1 User profile user class and special authorities -- 1.2.2 Object security -- 1.3 iSeries TCP/IP networking security -- 1.4 Operations Navigator interfaces to iSeries security -- Chapter 2. Security policies and authorization lists -- 2.1 Operations Navigator Security component -- 2.2 Authorization lists -- 2.2.1 New authorization list example -- 2.2.2 Adding users to an authorization list example -- 2.2.3 Adding an authorization list to secure an object example -- 2.2.4 Display an authorization list's secured objects example -- 2.2.5 Authorization list and group profile comparison -- 2.3 Auditing policy -- 2.3.1 System policy properties -- 2.3.2 Journaling -- 2.3.3 New objects -- 2.4 Password policy -- 2.5 Security policy -- 2.6 Sign-on policy -- 2.7 Security wizard -- 2.7.1 Security wizard output options: Administrators or system users -- Chapter 3. Users and groups -- 3.1 Users and groups overview -- 3.1.1 My Connections Users and Groups overview -- 3.1.2 Management Central Users and Groups overview -- 3.1.3 What is an OS/400 user profile? -- 3.2 User Profile administration -- 3.3 Creating user profiles -- 3.3.1 New user -- 3.3.2 New Based On feature -- 3.3.3 User definition -- 3.4 Changing users -- 3.4.1 Properties -- 3.4.2 Changing a user's password -- 3.4.3 Edit a user/group -- 3.5 Distributing a user profile on another system -- 3.5.1 Send from user inventory -- 3.5.2 Drag and drop -- 3.6 Deleting users -- 3.7 Searching for users and user information -- 3.7.1 Basic search -- 3.7.2 Advanced search -- 3.8 Groups -- 3.8.1 Creating a group profile.

3.9 Users not in a group -- 3.10 User properties -- 3.10.1 User properties: Groups -- 3.10.2 User properties: Personal -- 3.10.3 User properties: Capabilities -- 3.10.4 User properties: Jobs -- 3.10.5 User properties: Networks -- 3.11 User objects -- 3.11.1 Scan for Owned Objects function -- 3.12 Security requirements for user and group administration -- Chapter 4. Permissions examples -- 4.1 Using Operations Navigator permissions to secure objects -- 4.2 File system level permissions -- 4.2.1 Permissions for the QSYS.LIB file system -- 4.2.2 Permissions for the QDLS file system -- 4.3 Object level permissions within a file system -- 4.3.1 Changing permissions for a QSYS.LIB object -- 4.4 Security needed for changing permissions -- 4.5 Authority required to display permissions -- Appendix A. System values -- Using online help to find system value details -- Using Information Center for system value information -- Appendix B. OS/400 object and data permissions -- General authority and permission terms reference -- OS/400 object authority "shortcut permission" cross-reference -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Index -- Back cover.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.