IBM i provides many options for securing the system and/or the data. Some, like working with user profiles, object authorities, and system values are obvious. Others … not so much.
During this session, IBM i security expert Carol Woodbury will explore some of the more obscure features of IBM i security—such as using the audit journal to determine whether sessions are encrypted, securing DDM, using an authorization list to prevent access to /QSYS.LIB, and more.
Join us for a far-reaching discussion!