• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Admin Alert: What To Do with Vendor Profiles During an Audit, PLUS Two Other Great Features

    November 2, 2011 Joe Hertvik

    System auditors generally don’t like i OS vendor-supplied profiles. You know, those user profiles that vendors require for software installation, ownership, or running special jobs. Some vendors even require you to give these profiles security officer (*SECOFR) or security administrator (*SECADM) authority. This can create audit points because auditors generally don’t like excessive security officer-enabled profiles on the system. Here are two strategies for handling this situation.

    What Is a Vendor-Supplied User Profile?

    A vendor-supplied user profile is any profile that exists on your i OS system in order to load software objects, or run vendor programs. It may also be used as a group profile for vendor software access. Most well-known Power i third-party software packages install their own user profiles for these purposes.

    Vendor user profiles often have system privileges far above what a standard user possesses, such as being security officer enabled or having all objects authority to the system. And that’s where the problem comes in.

    Two Ways To Set Up Vendor-Supplied Profiles To Pass Audits

    Financial, Sarbanes-Oxley, Payment Card Industry (PCI), and other system auditors generally dislike active vendor-supplied user profiles that possess one or more of the following characteristics.

    • User class equal to security officer (*SECOFR) or security administrator (*SECADM), because these profiles can perform most, if not all, system functions.
    • User class equal to programmer (*PGMR), because these profiles may also be able to perform special functions, including job control, system saves, and spooled file control.
    • Any user with all object (*ALLOBJ), security administrator (*SECADM), job control (*JOBCTL), or system save (*SAVSYS) special authority.

    A system auditor may ask for a listing of all active users who fall into one of these categories: a.k.a., a super user list. If your vendor profiles contain any of the features listed above, they should show up on the super user list.

    But there is an out. You may be able to omit these profiles from the list if a profile meets one or both of these criteria.

    • The profile is disabled.
    • The profile has no password for signing on.

    Changing your vendor profiles this way may be enough to drop that profile off your super user list. This is because they will no longer possess an audit danger.

    Let’s look at why these techniques may allow you to neutralize that profile, in the eyes of an auditor.

    Technique #1: Disabling the vendor profile.

    How to use: Run the following Change User Profile (CHGUSRPRF) statement.

    CHGUSRPRF USRPRF(profile_name) STATUS(*DISABLED)
    

    What it does: Prevents the user from signing on to the system. Not only will this stop them from signing on to a 5250 green screen, it will also stop them from signing on to the system from any client connection, such as an FTP session, an ODBC connection, or even a Web server.

    Situations to use this technique for:

    • Good for when the user profile is just used for object ownership; installing or updating the vendor software; or configuring the software (applying keys, making software adjustments, etc). The profile can be re-enabled for any legitimate maintenance functions and then disabled again after maintenance is finished.
    • Disablement is also good for when you want to use this profile to run batch jobs while preventing it from signing on to the system. Disabled user profiles can be used as the submitting profile for a batch job.

    Disabling a user profile should satisfy an auditor that a hacker cannot sign on to the system and perform work with that profile.

    Technique #2: The profile has no password for signing on.

    How to use: Run the following CHGUSRPRF statement.

    CHGUSRPRF USRPRF(profile_name) PASSWORD(*NONE)
    

    What it does: Prevents the user from signing on to the system. The profile remains enabled. However since it has no password, profile access remains disabled.

    Situations to use this technique for:

    No password profiles can be used in the same situations as a disabled user profile. However, you will have to add a password to these profiles in order for them to sign on to a 5250 screen and perform software maintenance.

    While removing a password from a user profile will effectively prevent the profile from being used, auditors may be more comfortable accepting a disabled user profile rather than a profile with no password. Generally speaking, disabling vendor-supplied user profiles is a better audit strategy than removing their passwords.

    Of course, you can always combine the two strategies such that you disable your vendor user profiles AND remove their passwords. That would be the safest way to insure these profiles can’t be used to perform any damage. However, it might also be overkill.

    And that’s how you may be able to remove vendor-supplied profiles from your auditor’s super-user list.


    The Challenge from Don K

    On a different note, reader Don K. recently wrote in looking for information on how to access the HMC system console in 132-character mode. Don needs to run a 132-character system console through the Web but couldn’t find anything in IBM‘s documentation to enable it.

    I tried enabling this feature on my own Web-based HMC systems consoles. But like Don, I was unable to find the key to enabling 132-column support on my system consoles.

    So if anyone out there knows of a way to configure the HMC system console to display 132-characters through the Web interface, email me. Correct answers will be forwarded to Don. Winners will also be awarded prestigious Friend of the Column status for their good work.

    For Redundant Power i SMS Monitoring, is VOIP the same as using a POTS line?

    After my article on adding redundancy to Power i SMS Monitoring, reader RP wrote in to ask me about running i OS 6.1 SMS on Voice over Internet Protocol (VOIP).

    I was running the same setup as you detailed in your article, using Bytware‘s MessengerPlus and a Multimodem GPRS wireless modem. This worked great until we moved to another location that wasn’t able to provide regular 110V power to plug in my modem.

    In this case, I can’t use an external modem and I have no internal modem available. What do you think about using VOIP in this situation, where the VOIP line is my backup in case my Ethernet-based monitoring goes down? Is that defeating the purpose of installing a redundant line for SMS?

    –RP

    I’d have to agree with RP on this one. The whole idea behind putting in a redundant POTs landline for text alerts is that the POTs line would still be functioning if your Ethernet network goes down.

    If you use VOIP over Ethernet as your backup, you will have Ethernet routing redundancy. One message will go to a wireless carrier email address and another message goes to a Telocator Alphanumeric Protocol (TAP) number through your VOIP provider. But you won’t have transmission redundancy, because both messages are still going out over your Ethernet network. If your Ethernet network fails, your SMS messages will not be able to get out. That’s the trade-off with substituting VOIP SMS backup for POTs line SMS backup.

    Still, if you can’t get 110V power or a POTs line, I suppose Ethernet routing redundancy is better than nothing. It will still send a text alert if your email system goes down.

    One way to improve this situation could be to run your iSeries connection to your mail router and your VOIP network on totally different networks that reach the outside world on two different T1 connections. And if you can provision the two T1s from two different carriers, that would make the segregation even better. While this might be effective in providing redundancy for iSeries text alerts, it may be prohibitively expensive for what you’re trying to accomplish. If you’re going to go through all that trouble and expense, it might be worthwhile just to buy a modem card and install it in your machine.

    One final note on using a POTs line to transmit SMS messages from your i OS system. This week, I tried to modify my configuration to send POTs-line SMS messages to a T-Mobile cell phone. I quickly discovered that T-Mobile doesn’t support public TAP transmission. So while TAP may be a good idea to provide a secondary text alert path from your Power i box, be aware that it may not be available for all carriers.

    RELATED STORY

    Adding Redundancy to Power i SMS Monitoring



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    New Generation Software:  FREE Business Intelligence Webinar. November 9
    Dan Riehl Presents:  Fall Training Sale – Discounts up to 40%! RPG IV COBOL CL Admin Security
    BCD:  WebSmart PHP is the fastest way to develop IBM i and multi-platform PHP web apps

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Camouflage Updates Data Masking Software Adobe Flash Builder for the iSeries Programmer, Part 3

    Leave a Reply Cancel reply

Volume 11, Number 33 -- November 2, 2011
THIS ISSUE SPONSORED BY:

SEQUEL Software
Bytware
WorksRight Software

Table of Contents

  • Debugging Authority Failures, Part 3
  • Adaptable Data Areas
  • Admin Alert: What To Do with Vendor Profiles During an Audit, PLUS Two Other Great Features

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle