Although your IBM i server is one of the most securable platforms available, experts know that the protection of critical data is often undermined by weak security design at the application level. Programmers building new applications tend to want to solve a business problem and roll out code quickly—and don’t get me started on all of the legacy code we all have to deal with!
In the first of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He covers the security considerations that native application programmers should be keenly aware of as they design their applications, including:
- Object ownership
- Adopted authority
- Public and private authorities
- Command line permission
- Client-server considerations
Check Your IBM i Security
Find out where your systems are secure and where they might be vulnerable with a free IBM i Security Scan.