×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
I'm not advocating only using exit points. The best is to work from the
ground up. Secure the databases at the object/data level using auth.
Lists, etc., use group profiles to help facilitate that. Implement
application level authority, use exit points, etc. but i'm veering off
the original topic so i'll end with this:
Use all the tools available to secure your data, etc. never assume that
one level of security will protect your assets.
Thanks,
Tommy Holden
From: rob@xxxxxxxxx
To: Midrange Systems Technical Discussion <midrange-l@xxxxxxxxxxxx>
Date: 12/10/2010 10:48 AM
Subject: Re: Database security from PC applications.
Sent by: midrange-l-bounces@xxxxxxxxxxxx
What the OP was talking about originally was "Application Only Access".
Yes, that's a pain if we are talking about short life span. And many of
the Exit point security tools available out there can be salty for a short
life span.
I would still look at them. Then look at
http://publib.boulder.ibm.com/infocenter/iseries/v7r1m0/topic/rzaik/rzaikodbcexitprog.htm
Here's some scary reading:
http://publib.boulder.ibm.com/infocenter/iseries/v7r1m0/topic/rzaii/rzaiiodbc09.htm
After processing all that, then you can present options to management like
make or buy?
or other alternatives.
Rob Berendt
As an Amazon Associate we earn from qualifying purchases.