• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Restricted Access to SST

    November 2, 2005 Hey, Wayne O

    I want to set up two users to access the Start System Service Tools (STRSST) command. Is there a way to set them up so they can not change anything–that is, in view only mode? I want them to access the Analyze Log function only.

    –Reza

    I have good news for you. IBM added some additional controls in V5R2 to provide the exact function you want.

    As a security officer, start SST. This will require you to enter the SST password, which is case sensitive. Then, take the following actions:

    1. Create SST profiles for the two users. I recommend using the same name as the user profiles and assigning a password to their use of SST. The password is case sensitive.

    2. Using SST as the security officer, you can allow the users selected functions of SST. You would want to allow the Analyze Log function, but no other functions.

    –Wayne O. Evans

    Security articles authored by Wayne O. Evans can be found on his Web site, www.woevans.com. Click here to contact Wayne O. Evans by e-mail.


    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions.

    Upgrading to Power10, Power11, or cloud hosted system, Maxava has you covered!

    Book A Consultation Today

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Cyberscience Unveils Reporting Tool for iSeries Apps Infor’s Owners Gobble Up Geac for $1 Billion

    Leave a Reply Cancel reply

Volume 5, Number 41 -- November 2, 2005
THIS ISSUE
SPONSORED BY:

T.L. Ashford
WorksRight Software
Profound Logic Software

Table of Contents

  • Be Sure Qshell Accesses the Right IFS Data
  • Restricted Access to SST
  • Admin Alert: Hidden Secrets of the i5/OS Save Commands

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Pulls The Curtain Back A Smidge On Project Bob
  • IBM Just Killed Merlin. Here’s Why
  • Guru: Playing Sounds From An RPG Program
  • A Bit More Insight Into IBM’s “Spyre” AI Accelerator For Power
  • IBM i PTF Guide, Volume 27, Number 42
  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle