Do you really understand what authorization lists are and what they do?
By Rafael Victória-Pereira
Securing a file, program, or other object with an authorization list is the same as granting access to each user profile on the authorization list. To help understand the concept, think of an authorization as two sub-lists:
Download your free copy of the 2009 "State of System i Security" white paper.
By John Earl
Are you responsible for IBM i security at your business? Are you wondering how well your security stacks up against that of your peers in other organizations? Have you dealt with auditors who don't understand System i (AS/400) security and don't have any guidelines for auditing your system? Wouldn't it be great if you could compare yourself to the rest of the industry?