Best Practices for Managing Elevated IBM i Authorities – Part 2

This article on managing elevated IBM i authorities was originally published in Enterprise Executive. Part one of this two part post focused on how elevated authorities can create the risk for a data breach, how IBM i users can obtain elevated authorities, the challenges of managing elevated authorities, and the role of elevated authority management […]

Best Practices for Managing Elevated IBM i Authorities – Part 1

This article on managing elevated IBM i authorities was originally published in Enterprise Executive. Part one of this two part post focuses on how elevated authorities can create the risk for a data breach, how IBM i users can obtain elevated authorities, the challenges of managing elevated authorities, and the role of elevated authority management […]