68 lines
4.3 KiB
HTML
68 lines
4.3 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
||
|
<!DOCTYPE html
|
||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
|
<html lang="en-us" xml:lang="en-us">
|
||
|
<head>
|
||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
|
<meta name="security" content="public" />
|
||
|
<meta name="Robots" content="index,follow" />
|
||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
|
<meta name="DC.Type" content="concept" />
|
||
|
<meta name="DC.Title" content="Validation list objects" />
|
||
|
<meta name="abstract" content="Validation list objects provide a method for applications to securely store user authentication information." />
|
||
|
<meta name="description" content="Validation list objects provide a method for applications to securely store user authentication information." />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzamvconcepts.htm" />
|
||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
||
|
<meta name="DC.Format" content="XHTML" />
|
||
|
<meta name="DC.Identifier" content="validlist" />
|
||
|
<meta name="DC.Language" content="en-us" />
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
|
<title>Validation list objects</title>
|
||
|
</head>
|
||
|
<body id="validlist"><a name="validlist"><!-- --></a>
|
||
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
|
<h1 class="topictitle1">Validation list objects</h1>
|
||
|
<div><p>Validation list objects provide a method for applications to securely
|
||
|
store user authentication information.</p>
|
||
|
<div class="p">You can use validation list objects to perform the following tasks: <ul><li>Securely store user authentication information for applications.</li>
|
||
|
<li>Provide an authorization mechanism for users who do not have and do not
|
||
|
need an i5/OS™ user
|
||
|
profile, such as internet users.</li>
|
||
|
</ul>
|
||
|
</div>
|
||
|
<p>Validation list objects provide a method for applications to securely store
|
||
|
user authentication information.</p>
|
||
|
<p>For example, the Internet Connection Server (ICS) uses validation lists
|
||
|
to implement the concept of an <dfn class="term">internet user</dfn>. Validation lists
|
||
|
allow ICS to perform basic authentication before a web page is served. Basic
|
||
|
authentication requires users to provide some type of authentication information,
|
||
|
such as a password, PIN, or account number. The name of the user and the authentication
|
||
|
information can be stored securely in a validation list. The ICS can use the
|
||
|
information from the validation list rather than require all users of the
|
||
|
ICS to have a system user ID and password.</p>
|
||
|
<p>An internet user can be permitted or denied access to the system from the
|
||
|
web server. The user, however, has no authority to any system resources or
|
||
|
authority to signon or run jobs. A system user profile is never created for
|
||
|
the internet users.</p>
|
||
|
<p>Validation list objects are available for all applications to use. For
|
||
|
example, if an application requires a password, the application passwords
|
||
|
can be stored in a validation list object rather than a database file. The
|
||
|
application can use the validation list APIs to verify user passwords, which
|
||
|
are encrypted, rather than the application performing the verification itself. </p>
|
||
|
<p>For more information on validation list objects, see Chapter
|
||
|
7, <span class="q">"Planning the use of validation list objects"</span> in the <cite>iSeries™ Security
|
||
|
Reference</cite>.</p>
|
||
|
</div>
|
||
|
<div>
|
||
|
<div class="familylinks">
|
||
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvconcepts.htm" title="To effectively create a security policy and plan security measures for your system, you need to understand the following security concepts, some of which are general concepts and some of which are specific to the hardware type.">Concepts</a></div>
|
||
|
</div>
|
||
|
</div>
|
||
|
</body>
|
||
|
</html>
|