• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Admin Alert: Limiting the Long Reach of OS/400 Security Officers

    September 28, 2005 Joe Hertvik

    It almost goes without saying that i5/OS and OS/400 administrators should limit the number of users who have security officer authority (SECOFR). In the wrong hands, SECOFR users can delete files, manipulate information for ill-gotten gains, corrupt system configurations, and compromise organizational and customer secrets. So as a general operational principle, the fewer people who possess security officer access, the better.

    But in some organizations, it isn’t enough just to limit the number of people who are security officers. You may also be required to limit where and when the few security officers you do have can sign on. This is particular true in high-security environments where unauthorized access can cause true disasters and higher security standards must be adhered to. At the very least, you may want to prevent security officer users from logging in from multiple locations, logging in from remote locations, or restrict where they can change security and control settings. To that end, here are two techniques for limiting when, where, and how often a security officer can sign on.

    • Limit the number of devices a security officer can sign on to at one time. In OS/400, user profiles contain a parameter called Limit Device Sessions (LMTDEVSSN). When LMTDEVSSN is set to *NO, a user can start multiple and simultaneous OS/400 device sessions on your machine from literally any device in the world, or at least those devices that are accessible to your machine via cabling, a network to the Internet, or a wireless connection. But LMTDEVSSN can also be set to *YES, which tells OS/400 that this particular user can only log on to one session at a time on your target partition. By turning LMTDEVSSN on for SECOFR users, you can eliminate the possibility that two people can sign on at the same time from different locations with the same SECOFR user profile.
    • Limit the actual devices that a security officer can sign on to. OS/400 also contains a system value called Limit Security Officer device access (QLMTSECOFR). When set to ‘1’ (Limit), QLMTSECOFR limits which devices a security officer user profile can sign on to, forcing SECOFR users to only log on to the system console or to another device for which they are explicitly authorized.

    Here’s a couple of different ways to make it work.

    1. You can turn on QLMTSECOFR by using iSeries Operations Navigator or by using the green-screen Change System Value command (CHGSYSVAL) as follows:

    CHGSYSVAL SYSVAL(QLMTSECOFR) VALUE(‘1’)

    Once activated, QLMTSECOFR takes effect immediately for all users who have security officer access, which IBM defines as any user who has All Object (*ALLOBJ) and Security Administrator (*SECADM) authority. It does not affect any sessions where a SECOFR user had already signed on before the system value was changed.


    2. Without explicitly authorizing SECOFR users to any other devices, these users can only sign on to your partition’s system console. This is a very practical default consideration that prevents your SECOFR users from being cut-off from the system entirely when this feature is activated. QLMTSECOFR protects your SECOFR passwords from falling into the hands of a malicious user who might hack, overhear, or guess those passwords. By forcing you to explicitly authorize SECOFR users to specific devices, you are locking down the SECOFR user profile use so that it is less likely to be abused by the wrong people.

    3. To explicitly authorize a SECOFR user to use a specific device, you have to use the Work with Objects (WRKOBJ) command because there is no option to change object authorities from the Work with Device command (WRKDEVD). In my experience, you need to do the following steps to authorize a user to a specific device from the green-screen.

    • Bring up the device and all its associated devices by using the WRKOBJ command, as follows:
      WRKOBJ OBJ(*ALL/device_name*) OBJTYPE(*DEVD)

    • Where device_name is equal to the name of your device. In this example, I placed a wildcard asterisk (*) behind the device name so that–in addition to bringing up the core device name you are trying to authorize the user to–it would also show any variation device names that the SECOFR user may also need to sign on to. For example, if you were trying to authorize the user to sign on to a Client Access or iSeries Access PC5250 session named ‘JOE’, you might need to authorize the user to other devices named ‘JOEA1’, ‘JOEB1’, ‘JOEC1’, etc. This is because IBM‘s Client Access PC5250 program contains settings to automatically create and use new device names when requested or when a conflict occurs.
    • Once the WRKOBJ command shows you all the devices you requested, place a ‘2’ in front of each device that you want to authorize your SECOFR user to. This brings up the Edit Object Authority command (EDTOBJ) for that device, showing you which users are already explicitly authorized to the device and what authority they have. What you’ll see on the authorization list for most devices is that *PUBLIC has *CHANGE authority while a few other users, such as QTCP (the TCP/IP user) and QSYSOPR (the system operator), have *ALL authority to that device.
    • Assigning explicit authority to your SECOFR users is important because QLMTSECOFR tells OS/400 to ignore the device’s *PUBLIC authority for security officers and to only let a SECOFR user sign on to that device if they have explicit authority to do so. Otherwise, QLMTSECOFR prevents them from signing on. To add a SECOFR user (or users) to a device’s authority list from the EDTOBJ screen, press F6 (add new users) on that screen and add any SECOFR user that you want to the list of authorities for that device, giving each SECOFR user you add an object authority of *ALL.

    Once you follow these steps, your SECOFR users will only be authorized to the system console and to those devices for which you have explicitly given them authority to.

    So if your shop requirements call for enhanced restrictions on where and how you can use a security officer user profile, these two techniques can help you fill the bill.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    VISUAL LANSA 16 WEBINAR

    Trying to balance stability and agility in your IBM i environment?

    Join this webinar and explore Visual LANSA 16 – our enhanced professional low-code platform designed to help organizations running on IBM i evolve seamlessly for what’s next.

    🎙️VISUAL LANSA 16 WEBINAR

    Break Monolithic IBM i Applications and Unlock New Value

    Explore modernization without rewriting. Decouple monolithic applications and extend their value through integration with modern services, web frameworks, and cloud technologies.

    🗓️ July 10, 2025

    ⏰ 9 AM – 10 AM CDT (4 PM to 5 PM CEST)

    See the webinar schedule in your time zone

    Register to join the webinar now

    What to Expect

    • Get to know Visual LANSA 16, its core features, latest enhancements, and use cases
    • Understand how you can transition to a MACH-aligned architecture to enable faster innovation
    • Discover native REST APIs, WebView2 support, cloud-ready Azure licensing, and more to help transform and scale your IBM i applications

    Read more about V16 here.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    MaxAv’s New Wizard Simplifies Remote Journaling Setup Bsafe Steps Forward with New OS/400 Security Tools, Partners

    Leave a Reply Cancel reply

Volume 5, Number 36 -- September 28, 2005
THIS ISSUE
SPONSORED BY:

T.L. Ashford
WorksRight Software
Profound Logic Software

Table of Contents

  • API Corner: Database APIs
  • SQL Record Selection with Dynamic Lists
  • Admin Alert: Limiting the Long Reach of OS/400 Security Officers

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Liam Allan Shares What’s Coming Next With Code For IBM i
  • From Stable To Scalable: Visual LANSA 16 Powers IBM i Growth – Launching July 8
  • VS Code Will Be The Heart Of The Modern IBM i Platform
  • The AS/400: A 37-Year-Old Dog That Loves To Learn New Tricks
  • IBM i PTF Guide, Volume 27, Number 25
  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle