|
Removal of command line access from users? That is the easy part of security if you can get your business to buy into it. But do you have True Security? If you have the standard SSA installation, Group profile owns your BPCS environments and your users have this as part of their group profile then you may have an issue that needs to be resolved. With any thing like the Security set-up mentioned above a user can access your BPCS files via a PC, and do what they like, using tools such as ODBC, FTP, Remote command and SQL, File Transfer, even your Window explorer (and the list goes on). Many of these tools can be downloaded free from the Internet. ADSS International B.V have developed a Security product called 'ADSS Security' that will give you true Object level security, this means that users can be restricted. As most users Only need to use the BPCS menus they will NOT be able to use any other method apart from the standard BPCS menus. The special users or programs that need other methods for getting data in or out of your database will have the required ability, but Only to the files that they need to access. If you are interested in having True Security for your BPCS database contact ADSS. Web: www.adss.nl e-mail: mailto:info@adss.nl Phone: +31 (0)20 441 76 92 ______________________________ Reply Separator _________________________________ Subject: Command line access Author: "Coen;Gordon" <gordon.coen@abbott.com> at Internet Date: 03/12/99 04:58 People, Does anybody out there know how to remove command line access from users ? In most cases AS400 security will prevent users from doing anything 'harmful' but QPGMR could do a lot of damage. Thanks, Gordon. +--- | This is the BPCS Users Mailing List! | To submit a new message, send your mail to BPCS-L@midrange.com. | To subscribe to this list send email to BPCS-L-SUB@midrange.com. | To unsubscribe from this list send email to BPCS-L-UNSUB@midrange.com. | Questions should be directed to the list owner: dasmussen@aol.com +---
Received: from Kitten.mcs.com ([192.160.127.90]) by ccgate.bausch.com with SMTP (IMA Internet Exchange 3.11) id 000262BC; Fri, 3 Dec 1999 06:20:48 -0500 Received: from uucphost.mcs.net (Uucp1.mcs.net [192.160.127.93]) by Kitten.mcs.com (8.8.7/8.8.2) with ESMTP id FAA09210; Fri, 3 Dec 1999 05:20:14 -0600 (CST) Received: (from uucp@localhost) by uucphost.mcs.net (8.9.3/8.8.8) with UUCP id FAA72765; Fri, 3 Dec 1999 05:20:14 -0600 (CST) Received: (from majordom@localhost) by midrange.com (8.9.3/8.9.3) id GAA19356 for bpcs-l-outgoing; Fri, 3 Dec 1999 06:13:06 -0600 Received: (from uucp@localhost) by midrange.com (8.9.3/8.9.3) with UUCP id GAA19199 for BPCS-L@midrange.com; Fri, 3 Dec 1999 06:00:11 -0600 Received: from host241.abbott.com (host241.abbott.com [207.140.194.241]) by uucphost.mcs.net (8.9.3/8.8.8) with SMTP id EAA72159 for <BPCS-L@midrange.com>; Fri, 3 Dec 1999 04:56:26 -0600 (CST) Received: by host241.abbott.com id EAA20644 (InterLock SMTP Gateway 3.0 for BPCS-L@midrange.com); Fri, 3 Dec 1999 04:56:15 -0600 Received: by host241.abbott.com (Internal Mail Agent-2); Fri, 3 Dec 1999 04:56:15 -0600 Received: by host241.abbott.com (Internal Mail Agent-1); Fri, 3 Dec 1999 04:56:15 -0600 From: "Coen,Gordon" <gordon.coen@abbott.com> To: <BPCS-L@midrange.com> Subject: Command line access Message-Id: <0055600020716717000002L072*@MHS> Date: Fri, 3 Dec 1999 04:58:30 -0600 Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by midrange.com id GAB19199 Sender: owner-bpcs-l@midrange.com Precedence: bulk Reply-To: BPCS-L@midrange.com X-List-Name: BPCS Users Mailing List (BPCS-L@midrange.com)
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.