Security experts get tons of questions about IBM i security, including straight-forward questions about security concepts.

But some questions address the more obscure features and functions of IBM i security:

  • What’s the difference between profile swap and program adopt?
  • In what order does the system check authority?
  • How can you use attributes of the output queue to avoid granting users *SPLCTL authority?

In this on-demand webinar, you'll get answers these and other questions about the most confusing aspects of IBM i security. Join us for information that will useful for both beginners and veterans.