Working with i5/OS Security Controls

To achieve increased security, combine i5/OS security controls with on-site security measures and the BRMS functional usage model. User management is responsible for the evaluation, selection, and implementation of security features, administrative procedures, and appropriate controls in application systems and communication environments.

i5/OS security features include the use of passwords, a security option to limit read/write access for files, libraries, and folders during normal operations. To better understand i5/OS security options, review the Security Reference topic in the IBM i Information Center.

To ensure that you are protecting your media, IBM® recommends that you restrict access to the following BRMS-specific commands. Do this in addition to the other security measures that are discussed in this chapter.

IBM also recommends that you restrict access to the following i5/OS commands:

Use the Grant Object Authority (GRTOBJAUT) command to grant users access to these BRMS and i5/OS commands. Use the Remove Object Authority (RMVOBJAUT) command to remove user access from these commands.

Notes:
  1. IBM also recommends that you restrict user access to the QBRM library to BRMS users.
  2. IBM ships a default user profile that is called QBRMS as part of the basic i5/OS package. Do not delete this profile. This profile resolves security and authority issues between BRMS and i5/OS during a recovery, thereby restoring the BRMS profile in advance of other user profiles. For more information about QBRMS and network security, see Networking with BRMS.


[ Top of Page | Previous Page | Next Page | Contents | Index ]