• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Admin Alert: Giving Auditors What They Want

    August 27, 2008 Joe Hertvik

    Many i5/OS administrators hate system audits the way dental patients hate getting their teeth filled: they despise it with all their might, but realize the process might be somewhat healthy and beneficial for their system. This week, I’m going to look at some common system auditor requests for i5/OS configurations and show you how to retrieve that information from a Power i, System i, iSeries, or AS/400 machine.

    Default Passwords

    Your auditor may request a list of all users who use default passwords. Default passwords occur when the user’s password is the same as his or her user ID name (i.e., user JOE signs on with the password “JOE”). These passwords are fairly common, because the operating system will assign a default password to any new user ID it creates. For an explanation of the mechanics of default passwords, check out these articles on how default passwords are created and how to change your system to eliminate default passwords.

    Default passwords can be controversial because they may be needed under particular circumstances. They can be fairly common in warehouses with a workforce in flux, because it’s more difficult to keep up with expired passwords and implement password changes when signing on to a scanner. However, default passwords are also massive security risks because it’s easy for hackers or co-workers to sign on using another person’s identity and authorities. All of these concerns are why auditors search for them.

    To list all users with default passwords, run the following Analyze Default Passwords command (ANZDFTPWD).

    ANZDFTPWD ACTION(*NONE)
    

    ANZDFTPWD creates a QPSECPWD spooled file that lists all the default password users on your system. ANZDFTPWD also has other uses. It can disable all default password user profiles on your system and it can also be used to expire all default passwords. To learn about ANZDFTPWD’s other configurations, read this article on dealing with default passwords.

    The other cool thing about ANZDFTPWD is that it produces a physical file containing all the information from its QPSECPWD listing. Whenever you run ANZDFTPWD, a complete list of all user profiles with default passwords is copied in the QASECPWD file in the QUSRSYS library. This file can be read in other programs or in an SQL query to gather more information.

    Password Configuration Parameter Snapshots

    Sometimes an auditor will ask for a snapshot of all of your system’s password configuration parameters. This can easily be done with iSeries Navigator (OpsNav). Here are five easy steps for gathering i5/OS password parameters into a single Word document.

    1. Open a Microsoft Word document.
    2. Open OpsNav on your PC and follow the Security→Policies→Password Policy node for your target partition. This will show you the Password Policies Properties screen for that partition. This screen has three tabs for General, Validation, and Expiration policies.
    3. Click on the General tab on the Password Policies Properties window. This shows the system password level being used by your partition. Press the Alt→PrtSc keystroke combination to copy the entire General Password Policies properties window into your Windows clipboard. Alt→PrtSc is handy to use in situations like this because it only copies the window that you are currently working on. It doesn’t copy any other background windows that may also be open on your system, the way using the PrtSc key by itself will.
    4. Go back to Microsoft Word and paste the Password Policies Properties screen from the Windows clipboard into your Word document.
    5. Repeat steps 3 and 4, copying the Validation and Expiration Policies Windows from OpsNav into your Word document. When all three screens have been copied, save the file and either print it or email it to the auditor.

    Querying User Profiles

    Your auditors will also be interested in whatever non-essential special authorities are assigned to your user profiles. The easiest way to retrieve and print that information is by creating a user profile information file (UPIF). A UPIF is created as an output from the Display User Profile command (DSPUSRPRF), and it can contain user profile information for an individual user, a set of users, or all users on your system.

    UPIFs are easy to build. To create a UPIF file containing user profile information for all users on a system, run the following DSPUSRPRF command.

    DSPUSRPRF  USRPRF(*ALL) TYPE(*BASIC) OUTPUT(*OUTFILE)
       OUTFILE(LIB/FILENAME)
    

    Once this file is created, you can easily extract any user profile information that the auditor requests. In my experience, auditors are usually interested in any user profile that has one of the following user classes or special authorities.

    • User class *SECOFR (Security Officer) or *PGMR (Programmer)
    • All Objects (*ALLOBJ) or Security Administrator (*SECADM) special authorities
    • Users who have command line authority

    To retrieve this information from a recently created UPIF, you can either write a special program to read the file, or link the UPIF into a Microsoft Access database and run one of the following three SQL statements to get the information:

    1. Run this statement to get all user profiles with a user class equal to *SECOFR or *PGMR.

    SELECT * FROM LIB/FILENAME WHERE UPUSCL = '*SECOFR' OR UPUSCL = '*PGMR'
    

    The UPUSCL parameter in this statement is the variable that contains user class information for each user profile record.

    2. To retrieve all user profile records that contain *ALLOBJ or *SECADM authority in their profiles, run this SQL statement.

    SELECT * FROM LIB/FILENAME WHERE              
    UPSPAU LIKE '%ALLOBJ%' OR UPSPAU LIKE '%SECADM%'
    

    The UPSPAU field is a list variable that contains all the special authority settings for the user profile.

    3. To capture all the user records that have command line authority on the system, run this SQL statement.

    SELECT * FROM LIB/FILENAME WHERE UPLTCP = '*NO'
    

    The UPLTCP field contains a simple *YES or *NO value that designates whether or not command line authority should be denied for each user.

    The hardest part of using the UPIF is determining which fields in the file represent which parts of a user profile. The simplest way of retrieving field information is to print out a UPIF field map by running the following Display File Field Description (DSPFFD) command.

    DSPFFD FILE(LIB/FILENAME) OUTPUT(*PRINT)
    

    As you can see, a UPIF is incredibly valuable to have during a system audit. It can also be recreated anytime by simply running the DSPUSRPRF command listed above. For more information about UPIFs, see this article on the Joys of Creating User Profile Information Files.

    Retrieving Authorities for Certain Commands

    In addition to requesting information about user profiles, the auditors may be interested in discovering which users have access to critical system commands for working on jobs or the i5/OS job scheduler, including:

    • Submit Job command (SBMJOB)
    • Release Job command (RLSJOB)
    • Change Job command (CHGJOB)
    • Add Job Schedule Entry (ADDJOBSCDE) command

    All of these commands affect who can run or manipulate jobs on the system, and the auditors will want to see which non-essential users are able to run them. You can print out the list of authorized users and their authority to any particular i5/OS command by running the following Display Object Authority command (DSPOBJAUT) command.

    DSPOBJAUT OBJ(command_line) OBJTYPE(*CMD) OUTPUT(*PRINT)
    

    Auditors Want It All…And More

    If one thing’s certain with auditors, no matter what you give them, they’ll want more. But if you know where to look for your information, it will make it easier to update that information when the auditors request changes.

    RELATED STORIES

    Dealing with Default OS/400 Passwords

    Getting Around System i Default Passwords, Part 1

    Getting Around System i Default Passwords, Part 2

    The Joys of Creating User Profile Information Files



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Raz-Lee Security

    Start your Road to Zero Trust!

    Firewall Network security, controlling Exit Points, Open DB’s and SSH. Rule Wizards and graphical BI.

    Request Demo

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Infinite Software:  Migrate System i RPG or COBOL apps to Linux, Windows or Unix
    COMMON:  Join us at the Focus 2008 workshop conference, October 5 - 8, in San Francisco, California
    Computer Measurement Group:  CMG '08 International Conference, December 7-12, Las Vegas

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    Getting Started with PHP for i5/OS: List Price, $59.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket Developers' Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    iSeries Express Web Implementer's Guide: List Price, $59.00
    Getting Started with WebSphere Development Studio for iSeries: List Price, $79.95
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    WebFacing Application Design and Development Guide: List Price, $55.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    The All-Everything Machine: List Price, $29.95
    Chip Wars: List Price, $29.95

    Moshi Moshi Saga Continues at Bytware A Flash in the Pan or the Future of Data Storage?

    Leave a Reply Cancel reply

Volume 8, Number 30 -- August 27, 2008
THIS ISSUE SPONSORED BY:

Help/Systems
ProData Computer Services
System i Developer

Table of Contents

  • Automatic or Static Storage?
  • Jetty: An Efficient, Easy to Manage Alternative to WebSphere
  • Admin Alert: Giving Auditors What They Want

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle