The Quirks of IBM i Security Revealed

On-Demand Webinar

The Quirks of IBM i Security Revealed



Security expert Carol Woodbury gets asked to explain many different aspects of IBM i security. Some are questions about straightforward concepts, but other questions reach the more obscure features and functions of IBM i security. 

In this recorded webinar, Carol has gathered these questions and will provide examples and explanations for the more quirky and confusing aspects of IBM i security, including: 

  • What are the *ADOPT and *GROUP values you occasionally see when running the Display Object Authority command? 
  • What is primary group authority?

Watch this webinar on demand to get answers to these and other security questions. There will be something of interest to everyone!


No transcript is available at this time.