× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Vern,

That will turn all data, in all libraries, to all users - who have access, 
either on or off.  Nothing in there about only allowing particular users 
access to particular data.

But, hey, if nobody could access anything, it's a place to start.

Rob Berendt
-- 
"They that can give up essential liberty to obtain a little temporary 
safety deserve neither liberty nor safety." 
Benjamin Franklin 




Vern Hamberg <vhamberg@centerfieldtechnology.com>
Sent by: midrange-l-bounces@midrange.com
01/28/2003 08:22 PM
Please respond to Midrange Systems Technical Discussion
 
        To:     Midrange Systems Technical Discussion 
<midrange-l@midrange.com>
        cc: 
        Fax to: 
        Subject:        Re: Limiting Client Access


Jose

If you right-click on a connection in OpsNav, their is an option called 
"Application Administration". You can limit a person's authorization 
there. 
Go down to the "File Systems" area to limit access to objects under QSYS. 
Also, look under the "Database" section.

You should also be careful about NetServer shares (Windows networking file 

and printer shares).

I recommend looking at Tips and Tools for Securing Your iSeries, which you 

probably got with the machine, and is available at InfoCenter. Also, there 

are now some Redbooks on Managing you iSeries with Operations Navigator. 
Volume 2 is about security, volume 1 discusses Application Administration 
in Chapter 12.

Good luck

Vern

At 04:18 PM 1/28/2003 -0800, you wrote:



>Hello,
>
>One of our VPs wants us to give users client access
>but our concern is the access they will have to the entire database.
>Has anyone come across a situation where they have end-users needing
>file transfer capability from client access yet needed to protect the 
rest 
>of the live data.
>  If so how did you handle limiting their access.
>We don't use Object level security.
>
>TIA,
>
>Jose


_______________________________________________
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing 
list
To post a message email: MIDRANGE-L@midrange.com
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo.cgi/midrange-l
or email: MIDRANGE-L-request@midrange.com
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.