Managing OS/400 with Operations Navigator V5R1, Volume 2 : Security.
Material type:
- text
- computer
- online resource
- 9780738427515
- QA76.76.O63 -- M36 v.2 2003eb
Front cover -- Contents -- Notices -- Trademarks -- Preface -- Redbook series overview -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Chapter 1. Security overview -- 1.1 iSeries security overview -- 1.2 OS/400 security overview -- 1.2.1 User profile user class and special authorities -- 1.2.2 Object security -- 1.3 iSeries TCP/IP networking security -- 1.4 Operations Navigator interfaces to iSeries security -- Chapter 2. Security policies and authorization lists -- 2.1 Operations Navigator Security component -- 2.2 Authorization lists -- 2.2.1 New authorization list example -- 2.2.2 Adding users to an authorization list example -- 2.2.3 Adding an authorization list to secure an object example -- 2.2.4 Display an authorization list's secured objects example -- 2.2.5 Authorization list and group profile comparison -- 2.3 Auditing policy -- 2.3.1 System policy properties -- 2.3.2 Journaling -- 2.3.3 New objects -- 2.4 Password policy -- 2.5 Security policy -- 2.6 Sign-on policy -- 2.7 Security wizard -- 2.7.1 Security wizard output options: Administrators or system users -- Chapter 3. Users and groups -- 3.1 Users and groups overview -- 3.1.1 My Connections Users and Groups overview -- 3.1.2 Management Central Users and Groups overview -- 3.1.3 What is an OS/400 user profile? -- 3.2 User Profile administration -- 3.3 Creating user profiles -- 3.3.1 New user -- 3.3.2 New Based On feature -- 3.3.3 User definition -- 3.4 Changing users -- 3.4.1 Properties -- 3.4.2 Changing a user's password -- 3.4.3 Edit a user/group -- 3.5 Distributing a user profile on another system -- 3.5.1 Send from user inventory -- 3.5.2 Drag and drop -- 3.6 Deleting users -- 3.7 Searching for users and user information -- 3.7.1 Basic search -- 3.7.2 Advanced search -- 3.8 Groups -- 3.8.1 Creating a group profile.
3.9 Users not in a group -- 3.10 User properties -- 3.10.1 User properties: Groups -- 3.10.2 User properties: Personal -- 3.10.3 User properties: Capabilities -- 3.10.4 User properties: Jobs -- 3.10.5 User properties: Networks -- 3.11 User objects -- 3.11.1 Scan for Owned Objects function -- 3.12 Security requirements for user and group administration -- Chapter 4. Permissions examples -- 4.1 Using Operations Navigator permissions to secure objects -- 4.2 File system level permissions -- 4.2.1 Permissions for the QSYS.LIB file system -- 4.2.2 Permissions for the QDLS file system -- 4.3 Object level permissions within a file system -- 4.3.1 Changing permissions for a QSYS.LIB object -- 4.4 Security needed for changing permissions -- 4.5 Authority required to display permissions -- Appendix A. System values -- Using online help to find system value details -- Using Information Center for system value information -- Appendix B. OS/400 object and data permissions -- General authority and permission terms reference -- OS/400 object authority "shortcut permission" cross-reference -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Index -- Back cover.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.