× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Excellent ideas, everyone - thanks!  I appreciate the input.  Now to
figure out an attack plan. :)

Thanks!

/b;

-----Original Message-----
From: Al Mac [mailto:macwheel99@xxxxxxxxxxx] 
Sent: Thursday, September 21, 2006 12:13 PM
To: Midrange Systems Technical Discussion
Subject: Re: User Security Advice

I suggest expanding the PF design to house some code representing 
application such as General Accounting, or specific areas of Accounting,

such as General Ledger, that the relevant dept head may want to limit 
different people different kinds of access different areas.  So you have
a 
code like A* for Accounting, AG for General Ledger.  Develop this for
all 
applications.  Include IT dept e.g. accessing Security itself.  Instead
of 
a set of flags for ALL programs, you have ALL application areas, with
room 
for some growth.

So basically for an application like General Ledger, you'd have some
codes 
representing major activities ... is this person allowed to delete old 
journals, are they allowed to update journals, can they see critical 
accounts like owner's equity.  You come up with a set of access rules by

application manager desires, and recognize the software may not be 
structured to permit this set of rules to be implemented immediately,
but 
what you are doing is designing the security file to support reasonable
needs.

In the comments in the front of each program source code you have a 
reminder to the programmer about its security classification.  If ANYONE

asks you to modify this program to support activities outside this
security 
classification, identify relevant department heads who should be
notified 
what is going on here.

In front of EVERY program you'd have a CL to call the security checking 
routine.  It have parameter saying "I am accounting or whatever granular

area" and to run me people need whatever security classification.  This 
routine returns a YES GO or NO STOP flag to the calling program.  If the

result is NO, it might also send a MESSAGE to a security message queue
... 
such and such a user tried to run whatever software but did not have the

proper clearance.  This would be reviewed by the relevant dept managers
to 
say whose security and what programs ought to be adjusted to different 
security settings.

Can people access this stuff without going thru the front door menus, 
particularly the security file itself?  Does this stuff need to be
encrypted?

Hi All,



Does anyone have any advice on protecting home-grown programs and user
security?  Right now we have a very rudimentary security system that
protects programs based on the users "level".  This level has nothing
to
do with the built-in security used by the AS/400.  Instead, there's an
additional PF that houses the username, a security category (ie: "A"
for
all programs, "S" for only scanning programs, etc.). and a security
level (3 - can do everything, 0 - can do very little).



We're looking at revamping our entire security system to make it more
granular.  Instead of having a broad security level such as "A3", I'm
looking to go right down to the menu items and restrict on that.  So if
we have "001 - Production Control, 002 - Trailer Control, 003 - User
Profiles", I would have the user maintenance program allow access to
001, and 003 for a user, but restrict them from using 002.



However, we have almost 275 programs spread across 15 menus, so a
user's
profile may be large because in addition to their name and password,
they will have an extra 275 fields that will have a "Y" or "N" in them
to restrict their access to the programs.  Furthermore, when new menu
items are added, I will need to go into the user profile program and
update all records.  So I'm not sure if this is a viable solution.



I thought I'd consult the group for some advice, since I'm sure there
are others who have done this before.  If not, are there any good
Redbooks that cover this issue or has everyone rolled out their own
security solutions?



Thanks!



/b;



-=-=-=-=-=-=-=-=-=-=-=-=-=-

Brian Piotrowski

Assistant Mgr. - I.T.

Simcoe Parts Service, Inc.

Ph: 705-435-7814 x343

Fx: 705-435-6746

-=-=-=-=-=-=-=-=-=-=-=-=-=-



--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.



As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.