ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvmonactivity.htm

77 lines
4.6 KiB
HTML
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Monitor user profile activity" />
<meta name="abstract" content="As a security administrator, you need to control and audit changes that occur to user profiles on your system." />
<meta name="description" content="As a security administrator, you need to control and audit changes that occur to user profiles on your system." />
<meta name="DC.Relation" scheme="URI" content="rzamvmonitorauth.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="monactivity" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Monitor user profile activity</title>
</head>
<body id="monactivity"><a name="monactivity"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Monitor user profile activity</h1>
<div><p>As a security administrator, you need to control and audit changes
that occur to user profiles on your system.</p>
<p>User profiles provide entry to your system. Parameters in the user profile
determine a users environment and a users security characteristics.</p>
<p>You can set up security auditing so that your system writes a record of
changes to user profiles. You can use the <span class="cmdname">DSPAUDJRNE</span> command
to print a report of those changes. You can create exit programs to evaluate
requested actions to user profiles. </p>
<p>The following table shows the exit points that are available for user profile
commands.</p>
<div class="tablenoborder"><a name="monactivity__monusep"><!-- --></a><table cellpadding="4" cellspacing="0" summary="" id="monactivity__monusep" width="100%" frame="border" border="1" rules="all"><caption>Table 1. Exit points for user
profile activity</caption><thead align="left"><tr valign="bottom"><th valign="bottom" id="d0e29">User profile command</th>
<th valign="bottom" id="d0e31">Exit point name</th>
</tr>
</thead>
<tbody><tr><td valign="top" headers="d0e29 ">Create User Profile (<span class="cmdname">CRTUSRPRF</span>)</td>
<td valign="top" headers="d0e31 ">QIBM_QSY_CRT_PROFILE</td>
</tr>
<tr><td valign="top" headers="d0e29 ">Change User Profile (<span class="cmdname">CHGUSRPRF</span>)</td>
<td valign="top" headers="d0e31 ">QIBM_QSY_CHG_PROFILE</td>
</tr>
<tr><td valign="top" headers="d0e29 ">Delete User Profile (<span class="cmdname">DLTUSRPRF</span>)</td>
<td valign="top" headers="d0e31 ">QIBM_QSY_DLT_PROFILE</td>
</tr>
<tr><td valign="top" headers="d0e29 ">Restore User Profile (<span class="cmdname">RSTUSRPRF</span>)</td>
<td valign="top" headers="d0e31 ">QIBM_QSY_RST_PROFILE</td>
</tr>
</tbody>
</table>
</div>
<p>Your exit program can, for example, look for changes that might cause the
user to run an unauthorized version of a program. These changes might be assigning
either a different job description or a new current library. Your exit program
might either notify a message queue or take some action (like changing or
disabling the user profile) based on the information that the exit program
receives. </p>
<p>The <cite>Security Reference</cite> book provides more information about
the exit programs for user profile actions. See: <a href="../rzahg/rzahgsecref.htm">iSeries Security Reference</a>.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvmonitorauth.htm" title="This topic provides basic suggestions for monitoring the effectiveness of the security safeguards on your system.">Monitor authority</a></div>
</div>
</div>
</body>
</html>