77 lines
4.6 KiB
HTML
77 lines
4.6 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
|||
|
<!DOCTYPE html
|
|||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|||
|
<html lang="en-us" xml:lang="en-us">
|
|||
|
<head>
|
|||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|||
|
<meta name="security" content="public" />
|
|||
|
<meta name="Robots" content="index,follow" />
|
|||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|||
|
<meta name="DC.Type" content="concept" />
|
|||
|
<meta name="DC.Title" content="Monitor user profile activity" />
|
|||
|
<meta name="abstract" content="As a security administrator, you need to control and audit changes that occur to user profiles on your system." />
|
|||
|
<meta name="description" content="As a security administrator, you need to control and audit changes that occur to user profiles on your system." />
|
|||
|
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorauth.htm" />
|
|||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
|
|||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
|
|||
|
<meta name="DC.Format" content="XHTML" />
|
|||
|
<meta name="DC.Identifier" content="monactivity" />
|
|||
|
<meta name="DC.Language" content="en-us" />
|
|||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|||
|
<!-- US Government Users Restricted Rights -->
|
|||
|
<!-- Use, duplication or disclosure restricted by -->
|
|||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
|||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
|||
|
<title>Monitor user profile activity</title>
|
|||
|
</head>
|
|||
|
<body id="monactivity"><a name="monactivity"><!-- --></a>
|
|||
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
|||
|
<h1 class="topictitle1">Monitor user profile activity</h1>
|
|||
|
<div><p>As a security administrator, you need to control and audit changes
|
|||
|
that occur to user profiles on your system.</p>
|
|||
|
<p>User profiles provide entry to your system. Parameters in the user profile
|
|||
|
determine a user’s environment and a user’s security characteristics.</p>
|
|||
|
<p>You can set up security auditing so that your system writes a record of
|
|||
|
changes to user profiles. You can use the <span class="cmdname">DSPAUDJRNE</span> command
|
|||
|
to print a report of those changes. You can create exit programs to evaluate
|
|||
|
requested actions to user profiles. </p>
|
|||
|
<p>The following table shows the exit points that are available for user profile
|
|||
|
commands.</p>
|
|||
|
|
|||
|
<div class="tablenoborder"><a name="monactivity__monusep"><!-- --></a><table cellpadding="4" cellspacing="0" summary="" id="monactivity__monusep" width="100%" frame="border" border="1" rules="all"><caption>Table 1. Exit points for user
|
|||
|
profile activity</caption><thead align="left"><tr valign="bottom"><th valign="bottom" id="d0e29">User profile command</th>
|
|||
|
<th valign="bottom" id="d0e31">Exit point name</th>
|
|||
|
</tr>
|
|||
|
</thead>
|
|||
|
<tbody><tr><td valign="top" headers="d0e29 ">Create User Profile (<span class="cmdname">CRTUSRPRF</span>)</td>
|
|||
|
<td valign="top" headers="d0e31 ">QIBM_QSY_CRT_PROFILE</td>
|
|||
|
</tr>
|
|||
|
<tr><td valign="top" headers="d0e29 ">Change User Profile (<span class="cmdname">CHGUSRPRF</span>)</td>
|
|||
|
<td valign="top" headers="d0e31 ">QIBM_QSY_CHG_PROFILE</td>
|
|||
|
</tr>
|
|||
|
<tr><td valign="top" headers="d0e29 ">Delete User Profile (<span class="cmdname">DLTUSRPRF</span>)</td>
|
|||
|
<td valign="top" headers="d0e31 ">QIBM_QSY_DLT_PROFILE</td>
|
|||
|
</tr>
|
|||
|
<tr><td valign="top" headers="d0e29 ">Restore User Profile (<span class="cmdname">RSTUSRPRF</span>)</td>
|
|||
|
<td valign="top" headers="d0e31 ">QIBM_QSY_RST_PROFILE</td>
|
|||
|
</tr>
|
|||
|
</tbody>
|
|||
|
</table>
|
|||
|
</div>
|
|||
|
<p>Your exit program can, for example, look for changes that might cause the
|
|||
|
user to run an unauthorized version of a program. These changes might be assigning
|
|||
|
either a different job description or a new current library. Your exit program
|
|||
|
might either notify a message queue or take some action (like changing or
|
|||
|
disabling the user profile) based on the information that the exit program
|
|||
|
receives. </p>
|
|||
|
<p>The <cite>Security Reference</cite> book provides more information about
|
|||
|
the exit programs for user profile actions. See: <a href="../rzahg/rzahgsecref.htm">iSeries Security Reference</a>.</p>
|
|||
|
</div>
|
|||
|
<div>
|
|||
|
<div class="familylinks">
|
|||
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvmonitorauth.htm" title="This topic provides basic suggestions for monitoring the effectiveness of the security safeguards on your system.">Monitor authority</a></div>
|
|||
|
</div>
|
|||
|
</div>
|
|||
|
</body>
|
|||
|
</html>
|