Security experts get tons of questions about IBM i security, including straight-forward questions about security concepts.
But some questions address the more obscure features and functions of IBM i security:
– What’s the difference between profile swap and program adopt?
– In what order does the system check authority?
– How can you use attributes of the output queue to avoid granting users *SPLCTL authority?
In this on-demand webinar, you’ll get answers these and other questions about the most confusing aspects of IBM i security. Join us for information that will useful for both beginners and veterans.