• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Allowing User Profiles Without Passwords to Sign On

    April 26, 2006 Hey, Joe

    In your article about Setting Up User Profiles Without Passwords, you said that when you set up a user profile to have a password of *NONE, this configuration ” . . . essentially disables a user from performing any type of interactive work on the system.” In my shop, we have implemented Network Authentication Service (NAS), along with Enterprise Identity Mapping (EIM) and a Kerberos server, to create a true Single Sign-On environment. My profile has a password of *NONE and the Kerberos-NAS-EIM configuration handles the authentication to the AS400. I log into a 5250 session multiple times a day and perform interactive work all day long. Typically, this just means that my user profile only needs to authenticate to the Windows Active Directory Domain in order to access i5 services.

    –Mike

    While I’ve covered Single Sign-On (SSO) and its relationship to users without passwords in earlier columns (see the Related Stories section below), I neglected to mention SSO in the story about no-password users, and several readers have emailed to remind me about it during the last few weeks. This week, I would like to set the record straight.

    This omission was an oversight on my part, since I was touting the use of password-free users for securing group profiles and running batch jobs, but the fact remains that users without passwords can use SSO to start an interactive 5250 session without signing on. This does not mean that there isn’t security for these users. The security is there when you implement SSO; it’s just implemented in a different way.

    There are several procedures and requirements that prevent password-free users from having a free ride for unlimited 5250 sessions or to automatically use ODBC to upgrade i5/OS data inside a Windows program. Here’s how it works and why you may want to consider it for your shop.

    SSO is a technique where i5, or iSeries servers are configured as part of a Windows domain, the same as any other Windows file, print, or application server. Once users sign in to the domain at large, they are eligible to access i5/OS applications and data without entering another password for i5/OS access, the same way they are eligible to access Windows file shares, print servers, and applications on other Windows domain servers without entering a password. When an SSO user requests access to an i5-related application program, the request is reviewed and authorized by a Kerberos server; when that user is authenticated, the program and the i5/OS partition allow him to access data without having to sign-on. SSO is available for users running i5/OS V5R2 and above.

    But SSO access does not automatically happen, as it requires two separate configurations to allow users to access the system password-free. First, an i5/OS administrator must add any new SSO users to an Enterprise Identity Mapping table that tells the Kerberos and Network Authentication servers which i5/OS user profiles Windows users should be mapped to when they are automatically signed on to the system. So, just like fans trying to go backstage at a concert, no one gets a free shot at i5/OS applications and data without being on the list.

    The second configuration occurs on the individual user’s Windows desktop, which must be configured correctly to allow them to take advantage of SSO access. iSeries Navigator and some other Windows-to-i5 applications must be set up to request Kerberos authentication when the user wants to use that application. So there’s a desktop component that must also be set up correctly to allow no-password users to start a 5250 session or to run Windows applications that access i5 and iSeries data.

    Between these two configurations, Windows domain security sets the stage for enabling system access through an i5/OS user profile that is automatically mapped to the user’s Windows ID. Once configured, SSO access happens seamlessly beneath the covers, and the user will seldom have to think about signing on again.

    The only knock some administrators have against SSO is that they feel uncomfortable knowing that any user who happens to stumble across an unlocked Windows desktop can automatically start a 5250 session, an ODBC or JDBC session, or another i5-related application without signing on. They may feel that SSO presents a potential security violation, especially when their shop has already taken precautions to automatically disconnect or end inactive jobs in order to prevent unauthorized users from accessing the system. If Windows desktop security is an issue in your shop and you want to implement SSO, it might be prudent to require all machines to include a password-protected screen saver that automatically activates when the user’s keyboard has not been touched for a short amount of time, say five to ten minutes. That way, you can limit the amount of time a Windows desktop (and its SSO-enabled i5 applications) will remain open when a user steps away from her desktop.

    Regardless of this potential problem, SSO is a solid i5/OS feature that I recommend most shops consider implementing, as long as they thoroughly understand the configuration and any possible security issues.

    RELATED STORIES

    Getting Ready for Single Sign-On

    Configuring i5/OS and a Windows Network Server for SSO

    Configuring an i5/OS-based EIM Table for Single Sign-On

    Configuring Windows Desktops to Use SSO

    Setting Up User Profiles Without Passwords

    Dealing with Inactive Jobs

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Maximum Availability:  Secure, cost-effective, real-time iSeries replication software solutions
    SoftLanding Systems:  TurnOver Change Management for a more productive WDSc environment
    COMMON:  Join us at the Fall 2006 conference, September 17-21, in Miami Beach, Florida

    Digital TV Meets Portal Technology Migration RPG: Another Option for RPG II Shops

    Leave a Reply Cancel reply

Volume 6, Number 17 -- April 26, 2006
THIS ISSUE SPONSORED BY:

WorksRight Software
Advanced Systems Concepts
Twin Data

Table of Contents

  • Converting Unconvertible Dates Using SQL
  • Auditing of Sensitive Users and Objects
  • Allowing User Profiles Without Passwords to Sign On

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle