× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



There is no 100% solution for your needs 

However consider the following

Have a security plan

Setup your system security level
Identify profiles, group profiles, current user profiles and tasks that 
will access your data
Secure System Libraries, 
Secure Application libraries
If possible give *READ authority only to those remote *USERS and tasks

For ODBC/JDBC access control (using the IBM default database drivers)
Consider using the DB2 SQL exit points to check for SQL statements like 
UPDATE, INSERT, DELETE (at record level).
 Other statements to consider should be DROP TABLE, ALTER TABLE, .. In the 
exit points recognize the request and aprove/deny access 
For more information see the command WRKREGINF and look for the following 
entries
QIBM_QZDA_SQL1        ZDAQ0100     *YES     Database Server - SQL access 
QIBM_QZDA_SQL2        ZDAQ0200     *YES     Database Server - SQL access 
Modify the one that you will like to use
There is abundant documentation online with examples

I hope this helps 


Jorge Moreno
Overseas Military Car Sales
Woodbury, New York

Confidentiality Notice:This email, including its attachments, may contain 
information that is confidential and may be protected by federal and/or 
state laws and regulations, or other confidentiality privileges.  This 
email, including its attachments, may contain non-public information; 
therefore it is intended to be conveyed only to the designated 
recipient(s).  If you are not an intended recipient, please delete this 
email, including its attachments, and notify the sender.  The unauthorized 
use, dissemination, distribution or reproduction of this email, including 
its attachments, is prohibited and may be unlawful. 




"Erin Botkin" <EBotkin@xxxxxxxxxxxxxxxxxx>
Sent by: midrange-l-bounces@xxxxxxxxxxxx
05/05/2005 11:11 AM
Please respond to Midrange Systems Technical Discussion
 
        To:     <midrange-l@xxxxxxxxxxxx>
        cc: 
        Subject:        AS400 ODBC Security


Does anyone allow users to access AS400 from the internet?  How do you
secure the AS400 data for the ODBC connection.

Erin K. Botkin
Application Analyst
Spotsylvania County
Information Services
PHN: 540-582-7055 ext. 232
FAX:  540-582-9840

ebotkin@xxxxxxxxxxxxxxxxxx
-- 

This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing 
list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.



As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.