Authority Collection on IBM i 7.3 and 7.4

Track: System management and availability
Speaker: Scott Forstie

November 7, 2019
4:05 pm – 4:55 pm

A shiny security gem was added to the IBM i operating system in IBM i 7.3, known as Authority Collection. The gem was made even better in IBM i 7.4. This patented support is built into IBM i and can be leveraged by IBM i clients to do the following:

  1. Identify excess authority in such a manner that access to data
    can be reduced without the fear of breaking applications.
  2. Enable solution providers with
    a precise approach for
    understanding the source of
    authorization failures.
  3. Train your IBM i Security team.
    Don’t guess and don’t struggle. Use this technology to learn how to deploy security on IBM i.
  4. Efficiently debug authorization lacking problems. The tool will tell you what needs to be granted! Benefit to you… Productivity boost
    Benefit to you…Reducing excess
    Authority == Reduced Risk
    Benefit to you…Improved Security knowledge and deployment

Session overview
All rights reserved - Privacy policy