Security experts get tons of questions about IBM i security, including straight-forward questions about security concepts.
But some questions address the more obscure features and functions of IBM i security:
- What’s the difference between profile swap and program adopt?
- In what order does the system check authority?
- How can you use attributes of the output queue to avoid granting users *SPLCTL authority?
In this webinar, IBM i security expert Amy Williams answers these and other questions about the most confusing aspects of IBM i security. Join us for information that will useful for both beginners and veterans.