• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Restricted Access to SST

    November 2, 2005 Hey, Wayne O

    I want to set up two users to access the Start System Service Tools (STRSST) command. Is there a way to set them up so they can not change anything–that is, in view only mode? I want them to access the Analyze Log function only.

    –Reza

    I have good news for you. IBM added some additional controls in V5R2 to provide the exact function you want.

    As a security officer, start SST. This will require you to enter the SST password, which is case sensitive. Then, take the following actions:

    1. Create SST profiles for the two users. I recommend using the same name as the user profiles and assigning a password to their use of SST. The password is case sensitive.

    2. Using SST as the security officer, you can allow the users selected functions of SST. You would want to allow the Analyze Log function, but no other functions.

    –Wayne O. Evans

    Security articles authored by Wayne O. Evans can be found on his Web site, www.woevans.com. Click here to contact Wayne O. Evans by e-mail.


    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ServiceExpress

    IBM Power Expertise You Can Rely On

    Schedule a meeting with our experienced IBM Power consultants

    We work alongside you, understanding your budget, performance, and business objectives.

    Our IBM Power consultants can help you navigate:

    • EOSL for Power8
    • Upgrading to Power10
    • Cost & performance comparisons

    Sign Up

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Cyberscience Unveils Reporting Tool for iSeries Apps Infor’s Owners Gobble Up Geac for $1 Billion

    Leave a Reply Cancel reply

Volume 5, Number 41 -- November 2, 2005
THIS ISSUE
SPONSORED BY:

T.L. Ashford
WorksRight Software
Profound Logic Software

Table of Contents

  • Be Sure Qshell Accesses the Right IFS Data
  • Restricted Access to SST
  • Admin Alert: Hidden Secrets of the i5/OS Save Commands

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • 40 Years Of DB2, But Even More For That No-Name Database Embedded In The System/38
  • API Dev Tool Delivers For Trucking Outfit
  • Guru: TryIT – You’ll Like It
  • It’s Time To Tell Us How It Is And What You’re Doing
  • IBM i PTF Guide, Volume 25, Number 40
  • Shield Builds on Success with Nagios for IBM i
  • Why You Should Be Concerned About the MGM ‘Vishing’ Attack
  • IBM Bolsters Database Security with Guardium 12.0
  • Four Hundred Monitor, September 27
  • The IBM i Marketplace Survey Needs Your Input

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle