Before we get into examples of using these technologies, I want to make sure you know how to access them as well as provide some tips for using them.
By Carol Woodbury
Editor's Note: This article is excerpted from chapter 1 of the NEW security book, Mastering IBM i Security, by Carol Woodbury.
IBM i Access Client Solutions
Access Client Solutions (ACS) is the client software IBM provides for us to access IBM
i. I am shocked when I repeatedly see IBM i shops continuing to use the ancient Client Access for Windows software. You must migrate to ACS if you haven’t already done so! It’s only a matter of time before Microsoft issues a patch that breaks the software or there’s a new security vulnerability identified that affects the product. Because IBM no longer supports it, you’ll then be scrambling to migrate your users to ACS. Do you really want to be explaining to your management why you’re running software that hasn’t been supported in literally years and are now panicking when you could have had a controlled rollout of the currently supported product? And just because you’re running ACS doesn’t mean you shouldn’t pay attention to IBM Security Bulletins. Older versions of ACS have been identified as being exposed to the log4j vulnerability. In other words, you need to stay current! OK, I’ll get down off my soapbox now and explain some features of ACS.