From a user's point of view, security affects how they use and complete tasks on the system.
User security includes how users interact with the system to complete their tasks. It is important to consider how a user will view security. For example, setting passwords to expire every five days might frustrate and interfere with a user's ability to complete his or her job. On the other hand, too lax a password policy might cause security problems.
To provide the right security for your system, you need to divide security into specific parts that you can plan, manage, and monitor. From a user's point of view, you can divide your system security into several parts.
User security includes all areas where security affects the users and where users can affect the system. Key components of user security include:
Physical security protects the system unit and all system devices, including backup storage media, such as diskettes, tapes, or CDs from accidental or intentional loss or damage. Most measures you take to ensure the physical security of your system are external to the system. However, the system ships with a keylock or electronic keystick that prevents unauthorized use of functions at the system unit.
Signon security prevents a person who is not identified on the system from signing on. To sign on, an individual must present valid credentials, such as entering a valid combination of user ID and password. You can use both system values and individual user profiles to make sure that your sign-on security is not violated. For example, you can require that passwords be changed on a regular basis. You can also prevent the use of passwords that are easy to guess.
An important role of security, and of system customization, is to define what users can do. From a security perspective, this is often a limiting function, such as preventing people from seeing certain information. From a system customizing perspective, this is an empowering function. A properly customized system makes it possible for people to do their jobs well by eliminating unnecessary tasks and information. Some methods for defining what users can do are appropriate for the security officer, while others are the responsibility of programmers. This information focuses primarily on those things that a security officer usually does. Parameters are available in individual user profiles, job descriptions, and classes to control what the user can do on the system. The list below briefly describes the techniques available:
You can limit users to a specific program, menu or set of menus, and a few system commands based on their user profile. Usually, the security officer creates and controls user profiles.
System functions allow you to save and restore information, manage printer output, and set up new system users. Each user profile specifies which of the most common system functions that the user can perform. You perform system functions by using control language (CL) commands and APIs. Because every command and API is an object, you can use object authorities to control who can use them and complete system functions.
Resource security provides the capability to control the use of every object on the system. For any object, you can specify who can use it and how they can use it. For example, you can specify that one user can only look at the information in a file; another user can change data in the file; a third user can change the file or delete the entire file.
The processing power on your system can become just as important to your business as the data that you store on it. The security officer helps to ensure that users do not misuse system resources by running their jobs at a high priority, printing their reports first, or using too much disk storage.
Additional security measures may be necessary if your system communicates with other computers or with programmable workstations. If you do not have proper security controls, someone on another computer in your network can start a job or access information on your computer without going through the sign-on process. You can use both system values and network attributes to control whether you allow remote jobs, remote access of data, or remote PC access on your system. If you allow remote access, you can specify what security to enforce. You can find descriptions for all system values in Chapter 3, "Security System Values," of the iSeries™ Security Reference.
You need to regularly back up the information on your system. In addition to saving the data on your system, you need to save security information. If a disaster occurs, you need to be able to recover information about system users, authorization information, and the information itself.
The system provides several tools for monitoring security effectiveness:
You can customize your system to help your users accomplish their daily work. To best customize your system for your users, think of what they need to accomplish their work successfully. You can customize the system to show menus and applications in several ways:
Most of us arrange our desks and our offices so we can easily reach the things that we need most. Think of your users' access to the system in the same way. After signing on to the system, a user should first see the menu or display that person uses the most. You can easily design user profiles to make this happen.
Most systems have many different applications on them. Most users only want to see the things they need to do their jobs. Limiting them to a few functions on the system makes their jobs easier. With user profiles, job descriptions, and appropriate menus, you can give each user a specific view of the system.
Users should not have to worry about how to get their reports to the correct printer or how their batch jobs should run. System values, user profiles, and job descriptions do these things.
No matter how well you succeed in customizing the system, users may still wonder "Where is my report?" or "Has my job run yet?" Operational Assistant displays provide a simple interface to system functions, which help users answer these questions. Different versions of system displays, called assistance levels, provide help for users with different levels of technical experience. When your system arrives, Operational Assistant displays are automatically available for all users. However, the design of your applications may require you to change the way users get access to the Operational Assistant menu. The system provides tools which allow you to customize your system security to protect your resources while allowing users to access those resources.
Related concepts
Planning user security Setting up user security Saving security information