Know this issue with hosting and on-premise customers. Depending on network configuration
and data protection rules one could setup a table of IP addresses and allowed user names
and check this in the telnet exit point or FTP exit point (depending on application
environment).
You also might check out system value QLMTDEVSSN.
In the end it's a question of hard rules set by the management and education of the users...

-h

Am 30.01.2020 um 17:19 schrieb Howie, Bill <BHowie@xxxxxxxxxxxxxxxx>:

Hello all,

I've got a question for the group.....we are discovering instances of users on our system who are sharing passwords

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.