× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



I think one of the biggest problems is "vendor enforced" holes in
security.  For instance, one client has a popular ERP package that was
developed before network attachment to System i (actually, at the time
S/38).  So security is all at the application level, and a common owner
owns all the data files.

This underlying security model is carried forward, so now, even though
the ERP has its own Client/Server implementation and users routinely do
things like downloading files into Excel, the objects are still owned by
one user with all authority to them, and everyone is pretty much a
member of that user's group.

That of course means someone with a legit signon can do things like see
data that they couldn't via the green screen app, and, what's worse,
alter or delete data (once had a developer drop a table in production
instead of test in error!).  

The answer they use is exit point programs, but this adds a layer of
admin and is not completely bulletproof.  Natively, though, it's hard to
enforce read write through the green screen app, but read only to some
files and exclude from others via other means without exit point
programs.  

What makes it all the more difficult is the vendor can offer little
guidance on what files users can safely be locked out of.

Certainly not a situation unique to our platform, but one that could be
solved if software authors would place more emphasis on its importance.


 
Jeff Carey
Acxiom Corp.
Join Toastmasters! 
http://www.toastmasters.org/

COMMON 2007 Annual Conference
http://www.common.org/conferences/2007/annual/ 

Join iSociety
http://isociety.common.org/
*************************************************************************
The information contained in this communication is confidential, is
intended only for the use of the recipient named above, and may be
legally privileged.

If the reader of this message is not the intended recipient, you are 
hereby notified that any dissemination, distribution or copying of this
communication is strictly prohibited.

If you have received this communication in error, please resend this
communication to the sender and delete the original message or any copy
of it from your computer system.

Thank you.
*************************************************************************


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Follow-Ups:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.