ibm-information-center/dist/eclipse/plugins/i5OS.ic.ddm_5.4.0.1/rbae5secreq.htm

65 lines
4.4 KiB
HTML
Raw Permalink Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="reference" />
<meta name="DC.Title" content="Security requirements for DDM" />
<meta name="abstract" content="You can prevent intentional and unintentional access to the data resources of a system by the DDM user." />
<meta name="description" content="You can prevent intentional and unintentional access to the data resources of a system by the DDM user." />
<meta name="DC.subject" content="security, requirements, DDM security requirements, user profile, command, CHGNETA (Change Network Attributes), Change Network Attributes (CHGNETA), command, CL, Change Network Attributes (CHGNETA), network attribute, changing, limitations, target DDM (TDDM), DDM target considerations" />
<meta name="keywords" content="security, requirements, DDM security requirements, user profile, command, CHGNETA (Change Network Attributes), Change Network Attributes (CHGNETA), command, CL, Change Network Attributes (CHGNETA), network attribute, changing, limitations, target DDM (TDDM), DDM target considerations" />
<meta name="DC.Relation" scheme="URI" content="rbae5prepddm.htm" />
<meta name="DC.Relation" scheme="URI" content="rbae5ddm1.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1999, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1999, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rbae5secreq" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Security requirements for DDM</title>
</head>
<body id="rbae5secreq"><a name="rbae5secreq"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Security requirements for DDM</h1>
<div><p>You can prevent intentional and unintentional access to the data
resources of a system by the DDM user.</p>
<div class="section"><p>Access to data in the DDM environment can be limited—or prevented
altogether—by a server-level network attribute, the DDMACC parameter on the <span class="cmdname">Change
Network Attributes (CHGNETA)</span> command on the server. This attribute
allows the server (as a target server) to prevent all remote access; or it
allows the server to control file access by using standard authority to files
and, further, by using an optional user exit program to restrict the types
of operations allowed on the files for particular users.</p>
</div>
<div class="section"><p>To provide adequate security, you might need to set
up additional user profiles on the target server, one for each source server
user who can have access to one or more target server files. Or, a default
user profile should be provided for multiple source server users. The default
user profile is determined by the communications entry used in the subserver
in which the target jobs are run.</p>
</div>
<div class="section"><p>For
user profiles (or their equivalent) on non-<span class="keyword">iSeries™</span> target
servers, refer to that server's documentation.</p>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rbae5prepddm.htm" title="There are several requirements that must be met for DDM to be used properly.">Prepare to use DDM</a></div>
</div>
<div class="relconcepts"><strong>Related concepts</strong><br />
<div><a href="rbae5ddm1.htm" title="This topic describes how iSeries security relates to DDM, and how it can limit access to the data resources of a target server by source server programs and users.">Security</a></div>
</div>
</div>
</body>
</html>