Security at the object level determines whether an IBM i user has permission to access, change, or even delete an object. But object-level security is challenging to implement and maintain. On many systems, object security isn’t fully configured or isn’t configured at all, leaving sensitive data vulnerable.
In this 2-part webinar, IBM i security expert Robin Tatam takes a deep dive into the concept of object security. You’ll learn:
- How object authorities work on IBM i
- The easiest way to implement object authority
- Shortcomings of object-level security—and how to overcome them
These sessions are packed with tips and tricks that no IBM i pro should miss!