On-Demand Webinar

Getting Started with IBM i Security: User Privileges

Get up to speed on special authorities, command line access, and auditing user activities
June 27, 2018


Experts’ fears surrounding the risks associated with poor configuration were recently confirmed by the 2018 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.

In this fast-paced webinar series, leading experts Robin Tatam and Sandi Moore share insights into critical areas of IBM i security.

This session presents a thorough investigation of user privileges, including:

  • What is a privileged user?
  • Everything you need to know about special authorities
  • Command line access
  • Turning users into administrators
  • How to audit user activities
  • IBM i's role-based access controls (RBAC)
Get Started

Find the security vulnerabilities on your IBM i and get recommendations for fixing them with a free Security Scan.

Stay up to date on what matters.