ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvvalidlist.htm

68 lines
4.3 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Validation list objects" />
<meta name="abstract" content="Validation list objects provide a method for applications to securely store user authentication information." />
<meta name="description" content="Validation list objects provide a method for applications to securely store user authentication information." />
<meta name="DC.Relation" scheme="URI" content="rzamvconcepts.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="validlist" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Validation list objects</title>
</head>
<body id="validlist"><a name="validlist"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Validation list objects</h1>
<div><p>Validation list objects provide a method for applications to securely
store user authentication information.</p>
<div class="p">You can use validation list objects to perform the following tasks: <ul><li>Securely store user authentication information for applications.</li>
<li>Provide an authorization mechanism for users who do not have and do not
need an i5/OS™ user
profile, such as internet users.</li>
</ul>
</div>
<p>Validation list objects provide a method for applications to securely store
user authentication information.</p>
<p>For example, the Internet Connection Server (ICS) uses validation lists
to implement the concept of an <dfn class="term">internet user</dfn>. Validation lists
allow ICS to perform basic authentication before a web page is served. Basic
authentication requires users to provide some type of authentication information,
such as a password, PIN, or account number. The name of the user and the authentication
information can be stored securely in a validation list. The ICS can use the
information from the validation list rather than require all users of the
ICS to have a system user ID and password.</p>
<p>An internet user can be permitted or denied access to the system from the
web server. The user, however, has no authority to any system resources or
authority to signon or run jobs. A system user profile is never created for
the internet users.</p>
<p>Validation list objects are available for all applications to use. For
example, if an application requires a password, the application passwords
can be stored in a validation list object rather than a database file. The
application can use the validation list APIs to verify user passwords, which
are encrypted, rather than the application performing the verification itself. </p>
<p>For more information on validation list objects, see Chapter
7, <span class="q">"Planning the use of validation list objects"</span> in the <cite>iSeries™ Security
Reference</cite>.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvconcepts.htm" title="To effectively create a security policy and plan security measures for your system, you need to understand the following security concepts, some of which are general concepts and some of which are specific to the hardware type.">Concepts</a></div>
</div>
</div>
</body>
</html>