TechTips / Security

TechTip: Managing Authorization Lists 101, Part III PDF Print E-mail
Tips & Techniques - Security
Written by Rafael Victoria-Pereira   
Friday, 29 May 2009 01:00

Using authorization lists offers many advantages for those people charged with maintaining system and data security.

rafael_victoria_preira.jpgBy Rafael Victória-Pereira

A well-structured authorization scheme that includes both user groups and authorization lists by application or library type allows for better control over the whole system, thus preventing unpleasant surprises and reducing the unauthorized-access risk.

Add a comment

Last Updated on Thursday, 28 May 2009 16:02
User Rating: / 1
TechTip: Managing Authorization Lists 101, Part II PDF Print E-mail
Tips & Techniques - Security
Written by Rafael Victoria-Pereira   
Thursday, 14 May 2009 01:00

If you're not properly using authorization lists, you could be in big trouble.

rafael_victoria_preira.jpgBy Rafael Victória-Pereira

In Part I of this series, you learned what authorization lists are and what they do. Now,  let's consolidate all that information with an example.

Company X has a Human Resources application running on its system. Several users from different departments need to access the application for various purposes:

Add a comment

Last Updated on Saturday, 16 May 2009 09:11
User Rating: / 2
User Rating: / 9
Partner TechTip: Let's Review! PDF Print E-mail
Tips & Techniques - Security
Written by Carol Woodbury   
Tuesday, 10 February 2009 19:00

So you've made your system compliant. Now you're done, right? Wrong!

carol_woodbury.gifBy Carol Woodbury

Compliance is not a one-time event. Without regularly scheduled reviews, you can fall out of compliance. Let's discuss some of those reviews.

Security Policy

Many laws and regulations require that your security policy be reviewed at least annually....

Add a comment

Last Updated on Thursday, 21 May 2009 12:25
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>

Page 8 of 18



See What i Can Do With Modern RPG Development

Your applications deserve more than just a new look! Change the perception of the IBM i as “old” with modern development tips from IBM and Profound Logic Software.
Watch as Barbara Morris, Brian May and Alex Roytman dive beneath the GUI surface to show the benefits of:


  • Working with free-format RPG in IBM i TR7
  • Breaking free from “The Cycle” of traditional RPG development
  • Going beyond the 10 character limit in display and database files
  • And more!

You'll also see a live demonstration of these techniques as the presenters create a modern web application before your eyes! 


Watch the Webinar Now!



MS Office Connector for Query/400

NGS' Qport Office enables Windows users to run IBM Query/400 queries to: 

 - Create and update Excel spreadsheets and Access databases

 - Create Word documents

 - Send to Windows screen and PC printers

No query conversion is required. Works with i5/OS V5R1 & above. Installs in minutes!

If you don’t have a budget to replace IBM Query/400, but want your users to have one click enhanced output of their queries.… Request the online license agreement and product download instructions today!

Offer good through December 31, 2013.