================================================================== 
SEARCH400.COM | Security Tip 
Aug. 12, 2003 
================================================================== 
FROM OUR SPONSORS: 

Get the Facts. Get Protected. Get StandGuard Anti-Virus.
http://search400.com/r/0,,16956,00.htm?bytware

SkyView Partners -- Security consulting from the finest...
http://www.skyviewpartners.com

================================================================== 
Essential explanations and tools to help secure the iSeries. 
 More tips: 
http://search400.techtarget.com/tipsIndex/0,289482,sid3_tax2f8,00.html

================================================================== 
In today's technical advice roundup you'll find tips, expert 
answers and input from your peers to the following iSeries 
security questions and concerns: 

Today's Featured Security Tip: 
  -- The adopted authority problem  

Answers to Other Technical Questions:
 - How does adopted authority work?
 - Implications of giving a user *SAVSYS special authority
 - Attention key drops the adopted authority
 - The danger of indiscriminately assigning special authorities
 
Important Announcements and Links
 - Live webcast: Expanded output functions for the iSeries
 - Tips Contest: Win an Electronic Crossword Challenger II
 - Free on Search400.com: White Papers on iSeries security
___________________________________________________________________
************************ SPONSORED BY Bytware, Inc. ***************

Viruses on the iSeries? This is not the AS/400 of the '80s and 
'90s, it's the iSeries of the 21st century. Be sure that your 
security measures are appropriate for the time.

Get the Facts. Get Protected. Get StandGuard Anti-Virus.
http://search400.com/r/0,,16956,00.htm?bytware

=================================================================== 
Today's Featured Tip 
=================================================================== 

The adopted authority problem  
by Rich Loeber
 
Objects, such as programs, on your iSeries can adopt authority from 
owners, from users, from other programs or even other systems. Is 
this a problem? It can be. It would be in your best interest to 
understand what programs have authority to bestow on those to whom 
the it should not be granted. 
 
>> CLICK here for the full tip:
http://www.search400.com/tip/1,289483,sid3_gci918560,00.html

=================================================================== 
Answers to Other Security Questions 
===================================================================

HOW DOES ADOPTED AUTHORITY WORK?
One user writes, "We don't want to give the *secadm to any user 
profiles, but still we need some user ID's other than Qsecofr to 
enable the user ID's. How does adopted authority work in this 
matter?" Search400.com security expert Carol Woodbury explains.
http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid458586_tax288767,00.html

IMPLICATIONS OF GIVING A USER *SAVSYS SPECIAL AUTHORITY
Systems management expert Ken Graap explains the possible
implications of giving a user *SAVSYS special authority to backup
other user's files. 
http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid372945_tax285222,00.html

ATTENTION KEY DROPS THE ADOPTED AUTHORITY
Is it possible to set the security on the attention key menu to 
release the adopted authority, yet put it back when the F3 back to 
the application? Read what security expert Carol Woodbury had to 
say.
http://search400.techtarget.com/ateQuestionNResponse/0,289625,sid3_cid517353_tax288767,00.html


THE DANGER OF INDISCRIMINATELY ASSIGNING SPECIAL AUTHORITIES
In this tip, security expert Dan Riehl explains the special 
authorities and points out the main exposures if they are not
assigned judiciously.
http://www.search400.com/tip/1,289483,sid3_gci865077,00.html

___________________________________________________________________
********************** SPONSORED BY SkyView Partners **************

as-sess-ment \a-'ses-ment\ n.  1: the act or instance of assessing 
or appraisal. Combine 'security' with 'assessment' and you have the 
act or instance of appraising a company's security.    

At SkyView Partners we don't let our consulting end with an
assessment.  Led by Carol Woodbury, former OS/400 chief security
architect for IBM, our team looks at your top 5 security risks,
explains why you should be concerned and provides you with a plan 
to address your need.   That's where security changes to 
action...with a plan. Visit http://www.skyviewpartners.com and tell 
us how we can help you.

________________________________________________________________ 
::::::::  DON'T MISS THESE IMPORTANT MESSAGES AND LINKS ::::::::

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
LIVE WEBCAST | Expanded output functions for the iSeries

Who: Bill Shaffer, iSeries Product Manager, Printing and E-output, 
IBM 

When: Tuesday, Aug. 19 at 2 p.m. EDT (18:00 GMT) 

Print functions for the iSeries are getting even better. New 
capabilities are being added to iSeries e-Output through Infoprint 
Server enhancements. These enhancements will extend the PDF and 
electronic output options you have with iSeries applications, 
particularly using a new set of functions called Intelligent 
Routing. Learn more about those enhancements, as well as additions 
to Infoprint Designer, from IBM's iSeries printing guru Bill 
Shaffer.

>> PRE-REGISTER today:
http://webevents.broadcast.com/techtarget/s400/071503/index.asp?loc=01

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
WIN A ELECTRONIC CROSSWORD CHALLENGER II | Tip contest

Do you have a time-saving tip or trick that makes your day a little 
easier? Why not send it in and take a chance at winning an awesome 
prize. This month we're giving away an Electronic Crossword 
Challenger II. One million crossword puzzles in the palm of your 
hand...plus clues in case you need help!

>> SUBMIT a Tip:
http://search400.techtarget.com/tipsSubmit/1,289485,sid3,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
WHITE PAPERS ON ISERIES SECURITY |Free on Search400.com

When it comes to securing your iSeries, the more advice and help 
you have the better. Browse Search400.com's white paper section
to find informative white papers on security and several other 
iSeries topics.

>> CLICK here to view the white papers:
http://search400.techtarget.com/whitepapersByCategory/0,293837,sid3_tax292513_idx0_off10,00.html

________________________________________________________________ 
:::::::::::::::::::::: SEARCH400 CONTACTS   ::::::::::::::::::: 

 TIP MAILBOX, (mailto:[EMAIL PROTECTED]) 
   >> Send us feedback on tips and ideas for new tip content. 
________________________________________________________________ 
  
 MICHELLE DAVIDSON, Site Editor 
(mailto:[EMAIL PROTECTED]) 
   >> Send us your story ideas and best practices. 
________________________________________________________________ 

 DEBRA TART, Assistant Editor (mailto:[EMAIL PROTECTED]) 
   >> Send us your tips and Best Web Links. 
________________________________________________________________ 

 DAVID GABEL, Executive Tech Editor 
(mailto:[EMAIL PROTECTED]) 
   >> Send me your technical tips and tip ideas. 
________________________________________________________________

 JILLIAN CORBY, sales representative (mailto:[EMAIL PROTECTED])
 >> Sponsor this or any other TechTarget newsletter.

 






:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media. http://www.techtarget.com

Copyright 2003 TechTarget. All rights reserved.


If you no longer wish to receive this newsletter simply reply to this
message with "REMOVE" in the subject line.  Or, visit
http://search400.techtarget.com/register and adjust your
subscriptions accordingly.If you choose to unsubscribe using our
automated processing, you must send the "REMOVE" request from the
email account to which this newsletter was delivered.  Please allow
24 hours for your "REMOVE" request to be processed.

Reply via email to