Configuring the system to use security tools

 

This information describes how to set up your system to use the security tools that are part of i5/OS®.

When you install i5/OS, the security tools are ready to use. The topics that follow provide suggestions for operating procedures with the security tools.

 

Using security tools securely

When you install i5/OS, the objects that are associated with the security tools are secure. To operate the security tools securely, avoid making authority changes to any security tool objects.

Following are the security settings and requirements for security tool objects:

 

Avoiding file conflicts

Many of the security tool report commands create a database file that you can use to print a changed version of the report. [Commands and menus for security commands] tells the file name for each command. You can only run a command from one job at a time. Most of the commands now have checks that enforce this. If you run a command when another job has not yet finished running it, you will receive an error message.

Many print jobs are long-running jobs. You need to be careful to avoid file conflicts when you submit reports to batch or add them to the job scheduler. For example, you might want to print two versions of the PRTUSRPRF report with different selection criteria. If you are submitting reports to batch, you should use a job queue that runs only one job at a time to ensure that the report jobs run sequentially.

If you are using the job scheduler, you need to schedule the two jobs far enough apart that the first version completes before the second job starts.

 

Parent topic:

Managing security

Related concepts
System security tools