ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvsignonsysval.htm

80 lines
4.7 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Signon system values" />
<meta name="abstract" content="You need to decide how users will sign on to the system." />
<meta name="description" content="You need to decide how users will sign on to the system." />
<meta name="DC.Relation" scheme="URI" content="rzamvplansyslvlsec.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="signonsysval" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Signon system values</title>
</head>
<body id="signonsysval"><a name="signonsysval"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Signon system values</h1>
<div><p>You need to decide how users will sign on to the system.</p>
<p>Signon allows user who have authority to your system access
to these resources. A signon consists of a user name and its associated password.
System values control who can sign on, how users can sign on, to which devices
users can sign on, and what actions the system takes when a user violates
signon rules. Signon system values can be categorized into those system values
that set up the signon environment, handle signon for interactive jobs, and
limit signon to specified users and devices. </p>
<p><strong>Signon environment</strong></p>
<p>Three system values allow you to create a signon environment for your users.
They provide information regarding signon activity and the number of signon
attempts a users has before the system takes some action. The following system
values provide ways to control the signon environment for users:</p>
<ul><li><a href="rzamvqdspspginf.htm">Display signon information</a></li>
<li><a href="rzamvqmaxsign.htm">Maximum signon attempts</a></li>
<li><a href="rzamvqmaxsignacn.htm">Maximum signon attempts
action</a></li>
</ul>
<p><strong>Interactive jobs</strong></p>
<p>Interactive jobs require continual two-way communications between the user
and the system to perform a task. An interactive job begins when a user signs
onto a system and enters a request, and the system responds by processing
the request. This pattern is repeated until the user ends the interactive
job by signing off the system. These three signon related system values work
together to provide security when dealing with interactive jobs: </p>
<ul><li><a href="rzamvqinactitv.htm">Time-out interval for inactive
jobs</a></li>
<li><a href="rzamvqinatmsgq.htm">Time-out interval action</a></li>
<li><a href="rzamvqdscjobitv.htm">Time-out interval for
disconnected jobs</a></li>
</ul>
<p><strong>Limiting signon</strong></p>
<p>In some case you may need to limit who and what has access to your system
resources. Users with all-object (*ALLOBJ) and security officer (*SECOFR)
authorities may need to be limited to certain workstations and devices. Also
workstations that may have physical security concerns, for example; computers
that are secluded and could be used by unauthorized user to gain access to
your system may also need to be limited.</p>
<ul><li><a href="rzamvqlmtsecofr.htm#qlmtsecofr">Limit security officer</a></li>
<li><a href="rzamvqlmtdevssn.htm">Limit device sessions</a></li>
<li><a href="rzamvqrmtsign.htm">Remote signon control</a></li>
</ul>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvplansyslvlsec.htm" title="System security entails controlling user access and their privileges, maintaining information integrity, monitoring processes and access, auditing system functions, and providing backup and recovery of security related information.">Plan system security</a></div>
</div>
</div>
</body>
</html>