The technology enabled by PCs and mobile devices is one of the biggest challenges facing IBM i security administrators.
By Carol Woodbury
Editor's Note: This article is excerpted from Chapter 10 of IBM i Security Administration and Compliance: Third Edition
Nothing underscores the inadequacies of menu-based security more than using mobile-device–based software to access IBM i databases. If you still rely solely on menu security to control your sensitive and confidential information (in other words, if you don’t use object-level security), your security configuration has holes. Let’s look at IBM’s Access Client Solutions (ACS) and some of the security issues you’ll have to deal with there.