× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



you cant run cwblogon without the /p switch.  If it is a security violation,
why would IBM supply it?

-----Original Message-----
From: midrange-l-bounces@xxxxxxxxxxxx
[mailto:midrange-l-bounces@xxxxxxxxxxxx]On Behalf Of Steve Martinson
Sent: Friday, July 30, 2004 10:25 AM
To: MIDRANGE-L@xxxxxxxxxxxx
Subject: RE: Client Access bypass signon (Dan Bale)


Dan,

So, you've "automated" your signon to the system via a clear-text batch
file.  That doesn't violate your organization's security policy?  Bad
enough that your doing that, but the batch file resides on the network?
That's even worse.

Is skipping a couple clicks and maybe typing 20 more characters (10 for
profile, 10 for password) worth leaving the keys to YOUR kingdom out
there on the share server?  When I say YOUR kingdom, I'm referring to
the fact that all activity on a system is tied to the user profile, so
whether it's you or someone who snagged your password from your batch
file that's using profile DBALE, the system doesn't differentiate, and
you are forever tied to the actions taken with the profile.

Best regards,

Steven W. Martinson, CISSP, CISM
Manager of OutLink Security
Jack Henry & Associates, Inc.
7800 Willowchase Blvd.
Houston, TX.  77070
     voice              281.517.8000
     external fax       281.517.8157
     internal ext       471800




NOTICE: This electronic mail message and any files transmitted with it are
intended exclusively for the individual or entity to which it is addressed.
The message, together with any attachment, may contain confidential and/or
privileged information. Any unauthorized review, use, printing, saving,
copying, disclosure or distribution is strictly prohibited. If you have
received this message in error, please immediately advise the sender by
reply email and delete all copies.



--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.