Printable PDF

Use this to view and print a PDF of this information.

To view or download the PDF version of this document, select iSeries™ and Internet security Link to a PDF (416 KB or 60 pages).

Start of change
You can view or download these related topics:
  • Intrusion detection Link to a PDF (about 160 KB). You can create an intrusion detection policy that audits suspicious intrusion events that come in through the TCP/IP network, such as incorrectly created IP packets. You also can write an application to analyze the auditing data and report to the security administrator if TCP/IP intrusions are likely to be underway.
  • Enterprise Identity Mapping (EIM) Link to a PDF (about 700 KB). Enterprise Identity Mapping (EIM) is a mechanism for mapping a person or entity (such as a service) to the appropriate user identities in various user registries throughout the enterprise.
  • Single signon Link to a PDF (about 600 KB). The single signon solution reduces the number of sign-ons that a user must perform, as well as the number of passwords that a user requires to access multiple applications and servers.
  • Plan and Set Up System SecurityLink to a PDF (about 3500 KB).
End of change

Saving PDF files

To save a PDF on your workstation for viewing or printing:
  1. Right-click the PDF in your browser (right-click the link above).
  2. Start of changeClick the option that saves the PDF locally.End of change
  3. Navigate to the directory in which you want to save the PDF.
  4. Click Save.

Downloading Adobe Reader

Start of changeYou need Adobe Reader installed on your system to view or print these PDFs. You can download a free copy from the Adobe Web site (www.adobe.com/products/acrobat/readstep.html)Link outside information center.End of change

Related concepts
Intrusion detection
Enterprise Identity Mapping (EIM)
Single Sign On
Plan and Set Up System Security