85 lines
5.8 KiB
HTML
85 lines
5.8 KiB
HTML
<?xml version="1.0" encoding="UTF-8"?>
|
|
<!DOCTYPE html
|
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
|
<html lang="en-us" xml:lang="en-us">
|
|
<head>
|
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
|
<meta name="security" content="public" />
|
|
<meta name="Robots" content="index,follow" />
|
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
|
<meta name="DC.Type" content="concept" />
|
|
<meta name="DC.Title" content="Security levels" />
|
|
<meta name="abstract" content="The operating system operates in one of several predefined levels of security. The security level currently in effect determines the level of detail that user profiles must provide to grant appropriate access to system resources. This level of detail can range from simple password management to explicitly providing a level of access to each object that a user can read or change." />
|
|
<meta name="description" content="The operating system operates in one of several predefined levels of security. The security level currently in effect determines the level of detail that user profiles must provide to grant appropriate access to system resources. This level of detail can range from simple password management to explicitly providing a level of access to each object that a user can read or change." />
|
|
<meta name="DC.Relation" scheme="URI" content="rzal2settingsecurity.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="../rzamv/rzamvplansec.htm" />
|
|
<meta name="DC.Relation" scheme="URI" content="../books/sc415302.pdf" />
|
|
<meta name="copyright" content="(C) Copyright IBM Corporation 1998, 2006" />
|
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1998, 2006" />
|
|
<meta name="DC.Format" content="XHTML" />
|
|
<meta name="DC.Identifier" content="rzal2sec" />
|
|
<meta name="DC.Language" content="en-us" />
|
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
|
<!-- US Government Users Restricted Rights -->
|
|
<!-- Use, duplication or disclosure restricted by -->
|
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
|
<title>Security levels</title>
|
|
</head>
|
|
<body id="rzal2sec"><a name="rzal2sec"><!-- --></a>
|
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
|
<h1 class="topictitle1">Security levels</h1>
|
|
<div><p>The operating system operates in one of several predefined levels
|
|
of security. The security level currently in effect determines the level of
|
|
detail that user profiles must provide to grant appropriate access to system
|
|
resources. This level of detail can range from simple password management
|
|
to explicitly providing a level of access to each object that a user can read
|
|
or change.</p>
|
|
<p>Security on your system is arranged in a series of levels or classes, each
|
|
offering a greater degree of security and protection of your data than the
|
|
previous. Select the level that best meets the needs of your organization.</p>
|
|
<p>You can use iSeries™ Navigator
|
|
to change these settings on a single system or across multiple systems.</p>
|
|
<dl><dt class="dlterm">Level 20</dt>
|
|
<dd>This level is referred to as password security. That is,
|
|
users must have a password and user ID that is recognized by your system to
|
|
gain access to the system. Both the user ID and initial password are created
|
|
for users by the system administrator.<p>This level of security offers all
|
|
users on the system total authority to do anything they want. That means they
|
|
can access all data, files, objects, and so on, on your system. This might
|
|
be appropriate for small businesses where internal security is a low priority,
|
|
but will likely be inappropriate for larger businesses that do not want every
|
|
employee to be able to access confidential payroll files, for example.</p>
|
|
</dd>
|
|
<dt class="dlterm">Level 30</dt>
|
|
<dd>This level is referred to as resource security. That is, users must have
|
|
a valid user ID and password defined for them by the system administrator,
|
|
and no longer have automatic access to everything on the system. User access
|
|
is limited by the security policies of the business.</dd>
|
|
<dt class="dlterm">Level 40</dt>
|
|
<dd>This level is referred to as system integrity security. That is, at this
|
|
level, the system itself is protected against users. User-written programs
|
|
cannot directly access the internal control blocks through pointer manipulation.<p>Level
|
|
40 is the default security level for every new installation.</p>
|
|
</dd>
|
|
<dt class="dlterm">Level 50</dt>
|
|
<dd>This level is referred to as enhanced system integrity security. Level
|
|
50 is the recommended level of security for most businesses, because it offers
|
|
the highest level of security currently possible. Not only is the system protected
|
|
against user-written programs, but it ensures that users only have access
|
|
to data on the system, rather than information about the system itself. This
|
|
offers greater security against anyone attempting to learn about your system.</dd>
|
|
</dl>
|
|
</div>
|
|
<div>
|
|
<div class="familylinks">
|
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzal2settingsecurity.htm" title="The operating system determines which resources users might access based on information in their user profiles and the security strategy implemented for this system. Learn about security settings and how to manage user authorities efficiently.">Security and user authority</a></div>
|
|
</div>
|
|
<div class="relinfo"><strong>Related information</strong><br />
|
|
<div><a href="../rzamv/rzamvplansec.htm">Plan and set up iSeries security</a></div>
|
|
<div><a href="../books/sc415302.pdf" target="_blank">Security Reference PDF</a></div>
|
|
</div>
|
|
</div>
|
|
</body>
|
|
</html> |