Protect Your IBM i Objects and Data with Authority Collection
2024-11-19, 11:15–12:05, Cipress

For many years, companies use applications whose IBM i objects provide excessive access to all user profiles on a system.
This can easily lead to data theft and unauthorized manipulation of data. However, since administrators are afraid of breaking an application,
they typically never change object permissions. A feature called Authority Collection can help administrators to implement a
Principle of Least Privilege without breaking a application and at the same time properly secure the application environment. Join this
session to learn about the Authority Collection feature, how it is being used, and what you need to do with the collected information
to better protect your application objects without breaking anything.

See also: Authority Collection

IT consultant architecting and implementing security solutions mainly in the IBM i and AIX area. I am also a frequent speaker at technical conferences. Specialties: Cryptography, Single Signon, Security assessments, Access Control concepts and implementation, IBM i networking, IBM i cryptographic programming, LDAP, IBM PowerSC, IBM PowerSC MFA. I am also the developer of the IBM i Syslog Reporting Manager (SRM).

This speaker also appears in: