Monitor user profile activity

As a security administrator, you need to control and audit changes that occur to user profiles on your system.

User profiles provide entry to your system. Parameters in the user profile determine a user’s environment and a user’s security characteristics.

You can set up security auditing so that your system writes a record of changes to user profiles. You can use the DSPAUDJRNE command to print a report of those changes. You can create exit programs to evaluate requested actions to user profiles.

The following table shows the exit points that are available for user profile commands.

Table 1. Exit points for user profile activity
User profile command Exit point name
Create User Profile (CRTUSRPRF) QIBM_QSY_CRT_PROFILE
Change User Profile (CHGUSRPRF) QIBM_QSY_CHG_PROFILE
Delete User Profile (DLTUSRPRF) QIBM_QSY_DLT_PROFILE
Restore User Profile (RSTUSRPRF) QIBM_QSY_RST_PROFILE

Your exit program can, for example, look for changes that might cause the user to run an unauthorized version of a program. These changes might be assigning either a different job description or a new current library. Your exit program might either notify a message queue or take some action (like changing or disabling the user profile) based on the information that the exit program receives.

The Security Reference book provides more information about the exit programs for user profile actions. See: iSeries Security Reference.