Prepare to activate longer passwords (IBM i Security Level 20) Activating longer passwords on IBM i Security Level 20 is crucial for several reasons: Would you like more details on how to implement these changes on your system? We can use a simple SQL command to list all the users on the system and show

Read More

IBM i Authority In the IBM i environment, you can encounter situations where different users require varying levels of authority to access objects or applications. IBM i authority settings can seem a little daunting to new admins, but they grounded in decades of real world usage and were so well designed they really have changed

Read More

Comparing Object Authorities across different libraries is easier than you think! Using the magical powers of IBM i SQL we can easily create a spreadsheet containing all the objects in any given library and showing all their authority settings. You can run this SQL statement using green screen STRSQL or from your favorite desktop SQL

Read More

Control Command Line Access Here is a brief guide on how to control command line access for IBM i users: IBM i User Limited Capability Feature The Limit Capabilities feature in IBM i allows you to control the ability of a user to run CL commands at a command line by specifying the LMTCPB (Limit

Read More

Special Authorities – What are they on IBM i? If you come from the world of IBM I you will have heard of *ALLOBJ authority. This is the ultimate level of object access authority on an IBM I system. *ALLOBJ literally means you are authorized to read, change, or delete any/all objects on the system!

Read More

IBM i Authority is a wonderful beast with many layers of complexity. Like a big red onion, peeling back these layers is simple to do, but sometimes causes some tears, or occasionally full-on sobbing and weeping. The system can be anywhere from ultra secure to the other (naughty) end of the spectrum commonly known as

Read More

It’s time to install MariaDB on IBM i Following Part 1 – let’s dive into installing the actual thing and wade through any problems we see along the way. … Me – with a coffee MariaDB is a replacement for MySQL MariaDB is a fast, open-source, community developed branch of MySQL. Internal commands use the

Read More

The maximum password complexity on IBM i can be quite extensive, especially when using higher password levels. Here are the key points: Which raises the obvious question: How do I go about setting long IBM i passwords to match those in the Windows World? By setting the system to these higher levels, you can significantly

Read More

Tinkering with one of my wordpress sites I noticed that Jetpack was unable to connect. The WordPress Jetpack Error says “Server unable to connect with my site http 404” which is nicely vague. Luckily, the excellent support guys over at ICDSOFT quickly gave me the solution: 1: Log into the control panel obviously your control

Read More

More questions about adopting authority on IBM i Systems and a technique to change user authority temporarily. So lets #discuss 😉 Adopt higher IBM i Authority to change System Configuration Question: I am needing to write a program, command, or whatever, that will enable my users to adopt a higher authority when they want to

Read More

An old AS400 Quiz So, last night I was nosing around in the dim dark corners of an old network share on my homeserver. I stumbled across an old TXT document from the late 90’s, I think. It was sitting in a text file called “AS400 Quiz Brainteasers” -it’s obviously old (look at the as400

Read More

To avoid common IBM i password security exposures, consider these best practices: By following these practices, you can significantly enhance the security of your IBM i system.

...
Read More