Clearing Up IBM i Security Confusion
December 9, 2015 Alex Woodie
IBM i is a mature operating system that gives enterprises several ways to accomplish tasks. But sometimes this richness can generate confusion over the best way to accomplish something. For example, when should you use adopted authority in your applications, and when should you use user profile swapping? IBM i security expert Carol Woodbury recently addressed some of these questions. “I will often get questions about things like adopted authority or swapping profiles, and what’s the difference or are they the same,” Woodbury, the former OS/400 security architect at IBM, said in a recent “Coffee with Carol” Webinar hosted |