108 lines
7.7 KiB
HTML
108 lines
7.7 KiB
HTML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE html
|
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html lang="en-us" xml:lang="en-us">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<meta name="security" content="public" />
|
|
<meta name="Robots" content="index,follow" />
|
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|
<meta name="DC.Type" content="concept" />
|
|
<meta name="DC.Title" content="Security and user authority" />
|
|
<meta name="abstract" content="The operating system determines which resources users might access based on information in their user profiles and the security strategy implemented for this system. Learn about security settings and how to manage user authorities efficiently." />
|
|
<meta name="description" content="The operating system determines which resources users might access based on information in their user profiles and the security strategy implemented for this system. Learn about security settings and how to manage user authorities efficiently." />
|
|
<meta name="DC.Relation" scheme="URI" content="rzal2reference.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzal2authorities.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzal2sec.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzal2userprofiles.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="rzal2authlist.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="../rzakz/rzakz1.htm" />
|
|
<meta name="copyright" content="(C) Copyright IBM Corporation 1998, 2006" />
|
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1998, 2006" />
|
|
<meta name="DC.Format" content="XHTML" />
|
|
<meta name="DC.Identifier" content="rzal2settingsecurity" />
|
|
<meta name="DC.Language" content="en-us" />
|
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|
<!-- US Government Users Restricted Rights -->
|
|
<!-- Use, duplication or disclosure restricted by -->
|
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
|
<title>Security and user authority</title>
|
|
</head>
|
|
<body id="rzal2settingsecurity"><a name="rzal2settingsecurity"><!-- --></a>
|
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
|
<h1 class="topictitle1">Security and user authority</h1>
|
|
<div><p>The operating system determines which resources users might access
|
|
based on information in their user profiles and the security strategy implemented
|
|
for this system. Learn about security settings and how to manage user authorities
|
|
efficiently.</p>
|
|
<p>Security is a critical part of iSeries™ operations. It is built into
|
|
the operating system, and impacts nearly every function on the system. The iSeries security
|
|
environment determines the commands and functions available to users, and
|
|
the objects they can access.</p>
|
|
<p>Typically the security strategy restricts the objects a user can access.
|
|
For systems with object-level security, there are several ways to provide
|
|
authority to access objects. Often, user profiles will explicitly grant types
|
|
of access to specific objects. To simplify the task of managing all these
|
|
permissions, authorization lists can specify groups of objects, and users
|
|
can be given access to these lists. Accessing these lists then provides access
|
|
to all of the objects the list specifies.</p>
|
|
<p>The level of iSeries server
|
|
security, and other more detailed security practices, often affect system
|
|
operations. The following concepts are important for understanding user requirements
|
|
in various security environments:</p>
|
|
|
|
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" frame="void" border="0" rules="none"><tbody><tr><th align="left" valign="top" width="14.285714285714285%" class="firstcol" id="d0e36">Security levels</th>
|
|
<td valign="top" width="85.71428571428571%" headers="d0e36 ">The operating system operates in one of several predefined
|
|
levels of security. The security level currently in effect determines the
|
|
level of detail that user profiles must provide to grant appropriate access
|
|
to system resources. This level of detail can range from simple password management
|
|
to explicitly providing a level of access to each object that a user can read
|
|
or change.</td>
|
|
</tr>
|
|
<tr><th align="left" valign="top" width="14.285714285714285%" class="firstcol" id="d0e41">Security system values</th>
|
|
<td valign="top" width="85.71428571428571%" headers="d0e41 ">Many more detailed aspects of system security are set
|
|
by the system values. These system values set the security level, and grant
|
|
or restrict options like adopted authority.</td>
|
|
</tr>
|
|
<tr><th align="left" valign="top" width="14.285714285714285%" class="firstcol" id="d0e46">User profiles</th>
|
|
<td valign="top" width="85.71428571428571%" headers="d0e46 ">The user profile contains most of the authorizations and preferences
|
|
for individual users or groups. You can use iSeries Navigator to create
|
|
and manage users and groups across the server.</td>
|
|
</tr>
|
|
<tr><th align="left" valign="top" width="14.285714285714285%" class="firstcol" id="d0e54">Authorization lists</th>
|
|
<td valign="top" width="85.71428571428571%" headers="d0e54 ">You can create authorization lists that specify groups of objects.
|
|
Users and groups can then be authorized to this list, granting them authority
|
|
to everything that list contains.</td>
|
|
</tr>
|
|
</tbody>
|
|
</table>
|
|
</div>
|
|
<p>Also, security settings regarding policies and authorization lists are
|
|
available in iSeries Navigator
|
|
under <span class="uicontrol">Security</span>.</p>
|
|
</div>
|
|
<div>
|
|
<ul class="ullinks">
|
|
<li class="ulchildlink"><strong><a href="rzal2authorities.htm">Authority to access objects</a></strong><br />
|
|
Depending on the security level and other security settings, users might be given several levels of access to objects on the server.</li>
|
|
<li class="ulchildlink"><strong><a href="rzal2sec.htm">Security levels</a></strong><br />
|
|
The operating system operates in one of several predefined levels of security. The security level currently in effect determines the level of detail that user profiles must provide to grant appropriate access to system resources. This level of detail can range from simple password management to explicitly providing a level of access to each object that a user can read or change.</li>
|
|
<li class="ulchildlink"><strong><a href="rzal2userprofiles.htm">User profiles</a></strong><br />
|
|
The user profile contains most of the authorizations and preferences
|
|
for individual users or groups. With iSeries Navigator, you can create and
|
|
manage users and groups across the server.</li>
|
|
<li class="ulchildlink"><strong><a href="rzal2authlist.htm">Authorization lists</a></strong><br />
|
|
The task of granting each user authority to every separate object to which the user needs access can be time-consuming and complex. You can simplify this process by creating authorization lists that specify groups of objects. Users and groups can then be authorized to this list, granting them authority to everything that list contains.</li>
|
|
</ul>
|
|
|
|
<div class="familylinks">
|
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzal2reference.htm" title="Learn about the essential components of the iSeries server, including the basics of work management, how to interact with the operating system, and system maintenance.">i5/OS concepts</a></div>
|
|
</div>
|
|
<div class="relconcepts"><strong>Related concepts</strong><br />
|
|
<div><a href="../rzakz/rzakz1.htm">System values</a></div>
|
|
</div>
|
|
</div>
|
|
</body>
|
|
</html> |