A shiny security gem was added to the IBM i operating system in IBM i 7.3, known as Authority Collection. The gem was made even better in IBM i 7.4. This patented support is built into IBM i and can be leveraged by IBM i clients to do the following:
- Identify excess authority in such a manner that access to data
can be reduced without the fear of breaking applications.
- Enable solution providers with
a precise approach for
understanding the source of
- Train your IBM i Security team.
Don’t guess and don’t struggle. Use this technology to learn how to deploy security on IBM i.
- Efficiently debug authorization lacking problems. The tool will tell you what needs to be granted! Benefit to you… Productivity boost
Benefit to you…Reducing excess
Authority == Reduced Risk
Benefit to you…Improved Security knowledge and deployment