This system value allows you to set the security level for the system.
The system offers five different levels of security. Each of these levels of security provide specific security controls for the system. Depending on the decisions you made in the security policy, you can select a security level that you need. IBM® ships all new systems with the security level 40, which provides a high level of security that is necessary for most installations. It is not recommended that you change your security level on a new system lower that this value.
Even though IBM recommends you keep systems at level 40, lower values are described to provide a function-by-function comparison between each security level.
Security level | iSeries™ Navigator description | Functions allowed | Functions not allowed |
---|---|---|---|
10 (no security) 1 | No passwords are needed and users have authority to all resources | Provide users with *ALLOBJ access to all objects. | NA |
20 (low or relaxed security) | Passwords are required and users have authority to all resources |
|
|
30 (medium or average security) | Passwords are required and users' access is based on their authority |
|
|
40 (high or strict security) 2 | Protect from undocumented system interfaces |
|
|
50 (high or strict security) 3 | Enhance protection of system interfaces |
|
|
|
Relationship to your security policy
iSeries Navigator name | Security level |
---|---|
Character-based interface name | QSECURITY |
Authority | All object (*ALLOBJ) Note: The Security Officer (QSECOFR) user profile is shipped with
these authorities.
|
How to access | iSeries Navigator
Character-based interface
|
Changes take effect | At next restart of the server |
Default value | 40 (Protect from undocumented system interfaces) |
Recommended values | 40 (Protect from undocumented system interfaces) |
Lockable | Yes |
Special considerations | If you change from security level 10 to 20, 30, 40 or 50, you will not be able to change back to level 10. |
For more detailed information about this security value, see Chapter 3, "Security System Values" in Security Reference.