Cut Through IBM i Security Confusion | HelpSystems

Cutting Through IBM i Security Confusion

Security experts get tons of questions about IBM i security, including straight-forward questions about security concepts. 

But some questions address the more obscure features and functions of IBM i security:

  • What’s the difference between profile swap and program adopt?
  • In what order does the system check authority?
  • How can you use attributes of the output queue to avoid granting users *SPLCTL authority?

In this webinar, IBM i security expert Amy Williams answers these and other questions about the most confusing aspects of IBM i security. Join us for information that will useful for both beginners and veterans.

Aug 16, 2022
1 hour