User Profiles User Classifications Special Authorities Limiting Capabilities User Control Over Own Profile IBM-Supplied User Profiles Creating, Changing, and Deleting Profiles Using Model Profiles Group Profiles Object Authority Object and Data Rights Authority Search Sequence Granting and Revoking Authority Libraries, Files, and Output Queues Field Level Security Using Logical Files Column Level Security DLO and IFS Security Group Authority Object Ownership Public Authority Adopting Authority |
Security Controls Setting the Security Level Limiting Device Sessions Invalid Sign On Attempts Inactive Display Sessions Remote Sign On Password Rules Adopted Authority Security Strategies Password, Menu, and Resource Security Using Group Profiles Using Authorization Lists Object Ownership Policies Restricting Devices and Subsystems Security Officers and Administrators |
Tracking Security Events Authority Failures and Changes User Profile Changes Invalid Sign On Attempts Restored Objects Deleted Objects User Activity Object Activity |
Audience Experienced AS/400 personnel responsible for developing or implementing security policies. Prerequisites AS/400 Workstation Operations AS/400 System Operations AS/400 Advanced System Operations |
Format Self-Instructional Materials Thirteen Audio CDs Student Text Workbook Interactive Media |
Time Required Approximately 14 Hours |