IBM i security configuration is usually pretty straightforward, but there are a few things that, misconfigured, can produce results you don’t expect. Carol explores some of those areas of the system.
By Carol Woodbury
In most areas, IBM has done a decent job of making it obvious what the outcome of a particular setting will be, but some outcomes aren’t so obvious. In addition, I’ve seen administrators turn a straightforward configuration upside down and make it very difficult to understand the actual result of their configuration choice. In this article, I explain these scenarios in hopes that you will take a look at your own configurations and make sure you’re getting the outcome you think you are.