• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Raz-Lee Tackles Excessive Authorities with Free Software

    April 26, 2017 Alex Woodie

    You can’t do anything on IBM i without the proper authority. Unfortunately, instead of using the tools IBM includes in the OS to set fine-grained policies, most IBM i shops run wide-open when it comes to user authorities. Now Raz-Lee Security hopes reign in this free-for-all with a free tool it just released.

    For a glimpse at how bad the use of authorities in IBM i has gotten, check out our coverage of a recent security study of the IBM i marketplace. It’s no secret that there’s widespread abuse of special authorities, such as ALLOBJ and SECADM, among the majority of IBM i shops. Many user profiles and even group profiles run with these special authorities baked into them because it’s easier that way (if less secure).

    While abuse of special authorities arguably gets more press, a more widespread problem may be the misuse of authorities when it comes to object security.

    IBM empowers administrators to set access authority levels on public objects, including the data and programs used by common applications. About nine in 10 IBM i shops run with this public authority level set in a way that basically allows any user with a valid ID and password to access any piece of data in a given library, according to the previously mentioned study.

    IBM responded to this sad state of object-level security with a new capability in IBM i OS version 7.3 called “authority collection.” This capability essentially identifies which users have access to what data and determines what level of access they have and what level of access they should have.

    Unfortunately, getting useful information out of the authority collection is easier said than done. Without the capability to write complex SQL queries, most IBM i users will be out of luck when it comes to understanding the authority data collected.

    That’s where Raz-Lee Security hopes to make an impact with Authority Inspector, a new solution designed to help IBM i professionals better understand the information collected by the authority collection facility.

    Authority Inspector makes it easier for users to view and understand the data collected by IBM’s authority collection.

    According to Raz-Lee, Authority Inspector simplifies the information by presenting a summary of the authority collection data in easy-to-read tables and graphs. The software, which runs on a PC, replaces encoded field values with meaningful titles to further aid in understanding.

    Authority Inspector helps users create filters by selecting values directly from the screen, which further reduces the amount of data presented. Users can also export the data to Excel with a single click.

    Raz-Lee CEO Shmuel Zailer says the company decided to make this solution free as a way to pay back the community that has made the company so successful. “Raz-Lee has decided to give all customers its Authority Inspector product for free, with no license or maintenance charges, during 2017,” he says in a press release. “Simply visit our booth at COMMMON in Orlando or in Brussels, get the free code and download the product from our website and enjoy.”

    The New York-based company shared several other pieces of product news ahead of the COMMON Annual Meeting and Exposition, which is slated for May 7-10 in Orlando, Florida. The focus is on several new features in Raz-Lee’s iSecurity suite, including:

    • Better SIEM integration, including support for transforming IBM i log data into the specific formats preferred by IBM QRadar, HPE ArcSight, and Splunk;
    • A new report generator and scheduler that can incorporate any user or system command and spool file output as a report;
    • New real-time action alerts;
    • Compression of screenshots captured as part of monitoring to save disk space;
    • New restrictions to prevent reports from being emailed to specific addresses or domains.

    Raz-Lee will be exhibiting in booth 418 in the COMMON expo.

    RELATED STORIES

    State Of IBM i Security: Seven Areas That Demand Attention

    IBM i Priorities For 2017: Pivot To Defense

    IBM i 7.3: High Time For High Security

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: ALLOBJ, IBM i, SECADM, Special Authority

    Sponsored by
    DRV Technologies, Inc.

    Get More from Your IBM i

    Many users today struggle to get at the data they need on the IBM i. When users get reports, they look like they were formatted some time last century.

    Some organizations are still printing pre-printed forms and checks on impact printers.

    How often do operators log on to their system to look for messages they hope they don’t find?

    All of these scenarios can affect users’ perception of the IBM platform negatively, but there are simple solutions.

    DRV Technologies Inc. develops innovative solutions that help customers get more from their IBM i systems.

    Solutions include:

    • SpoolFlex spool conversion & distribution
    • FormFlex electronic forms
    • SecureChex MICR laser check printing
    • MessageFlex system monitoring

    FlexTools streamline resources, improve efficiency and enable pro-active system management.

    Better software, better service, DRV Tech.

    Learn how you can get more from your IBM i at www.drvtech.com

    Call 866 378-3366 for a Free Demonstration

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Four Hundred Monitor, April 26 Surround Tech Keeps IBM i Websites Hip to the Times

    Leave a Reply Cancel reply

TFH Volume: 27 Issue: 28

This Issue Sponsored By

  • New Generation Software
  • COMMON
  • Profound Logic Software
  • ASNA
  • Manta Technologies

Table of Contents

  • Optimism Abounds in VAI’s Inaugural Survey
  • Surround Tech Keeps IBM i Websites Hip to the Times
  • Raz-Lee Tackles Excessive Authorities with Free Software
  • Four Hundred Monitor, April 26
  • IBM i PTF Guide, Volume 19, Number 15

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Fortra Issues 20th State of IBM i Security Report
  • FNTS Launches Managed Services for Power Servers in IBM Cloud
  • Total LTO Shipped Capacity Up Slightly in 2022
  • Four Hundred Monitor, May 24
  • Update On Critical Security Vulnerability In PowerVM
  • Critical Security Vulnerability In PowerVM Hypervisor
  • IBM Power: Hosted On-Premises Or In The Cloud?
  • Guru: Watch Out For This Pitfall When Working With Integer Columns
  • As I See It: Bob-the-Bot
  • IBM i PTF Guide, Volume 25, Number 21

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2023 IT Jungle