Prepare to activate longer passwords (IBM i Security Level 20) Activating longer passwords on IBM i Security Level 20 is crucial for several reasons: Would you like more details on how to implement these changes on your system? We can use a simple SQL command to list all the users on the system and show

Read More

aka – “What do I need to consider before moving my IBM i to a Higher Password Level?” Before moving your IBM i Power System to a higher password level, there are several important considerations to ensure a smooth transition and maintain system security: By carefully planning and considering these factors, you can successfully move

Read More

Keeping your IBM i Power System Secure is key Using default passwords for your IBM i system is obviously a bad security practice! Default passwords can be a significant security risk because they are often well-known and can be easily guessed by unauthorized users. On your IBM i system, profiles that have a default password

Read More

IBM i HTTP Web Server Authentication using an IBM i User Profile and Password We tend to think of consuming a webservice (“connecting and reading from a webservice”) as something that is open to the public. But what if we want to add an extra level of authentication? How about we force the connection to

Read More

The maximum password complexity on IBM i can be quite extensive, especially when using higher password levels. Here are the key points: Which raises the obvious question: How do I go about setting long IBM i passwords to match those in the Windows World? By setting the system to these higher levels, you can significantly

Read More

Resetting forgotten IBM i (aka iSeries and AS400) passwords is a PITA! And I don’t mean PITA BREAD. So, a simple captcha style password reset, accessible from the user password signon screen has got to be a good idea… right? So, rather than the old “have you called the helpdesk to reset your password?” routine….

Read More

To avoid common IBM i password security exposures, consider these best practices: By following these practices, you can significantly enhance the security of your IBM i system.

...
Read More

I wrote a data encryption routine a few years ago. In my ongoing mission to refactor my old utilities, I was looking at it this weekend thinking about ways to improve it: The basic premise behind my routine is to read a row of information from a file, perform encryption of said data based on

Read More

Over recent years I’ve become increasingly focused on connecting IBM i Systems to the Internet – aka cloud for you trendy peeps. We live in an internet connected world and the requirements for a business to plug their back-office Power Servers into this big cloud is rapidly becoming a standard. With the huge increase in

Read More

Talking about an OBJECT in the IBMi world conjures up images of all kinds of wonderful screens defining object parameters: AS400 iSERIES and IBM i Object Authority Question: If a library has security for a user of *USE will this user be able to update files in the library and If files were created with

Read More

As 2011 New Years Eve came and went I spent a long time considering what my core personal resolutions should be: Eat Less, Exercise More, Speak Less, Think More. Obviously I have my slightly more extravagant resolutions which are bound to fail: Take up Aikido, Become a Wine Connoisseur, Learn how to write Android & iPad

Read More

Today, I was talking *techie* to a colleague in I.T. who still calls the IBMi Operating System – ‘The AS/400’. *sigh* We bumped over a few technology sleeping policemen during the conversation. Software is easy to upgrade. Mindsets are sometimes overlooked. This reminded me of the importance of keeping our skill sets current. If we

Read More