Security Guide for IBM i V6.1


Book Description

The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i® platform provides a rich set of security features and services that pertain to the goals of authentication, authorization, integrity, confidentiality, and auditing. However, if an IBM Client does not know that a service, such as a virtual private network (VPN) or hardware cryptographic support, exists on the system, it will not use it. In addition, there are more and more security auditors and consultants who are in charge of implementing corporate security policies in an organization. In many cases, they are not familiar with the IBM i operating system, but must understand the security services that are available. This IBM Redbooks® publication guides you through the broad range of native security features that are available within IBM i Version and release level 6.1. This book is intended for security auditors and consultants, IBM System Specialists, Business Partners, and clients to help you answer first-level questions concerning the security features that are available under IBM. The focus in this publication is the integration of IBM 6.1 enhancements into the range of security facilities available within IBM i up through Version release level 6.1. IBM i 6.1 security enhancements include: - Extended IBM i password rules and closer affinity between normal user IBM i operating system user profiles and IBM service tools user profiles - Encrypted disk data within a user Auxiliary Storage Pool (ASP) - Tape data save and restore encryption under control of the Backup Recovery and Media Services for i5/OS (BRMS) product, 5761-BR1 - Networking security enhancements including additional control of Secure Sockets Layer (SSL) encryption rules and greatly expanded IP intrusion detection protection and actions. DB2® for i5/OS built-in column encryption expanded to include support of the Advanced Encryption Standard (AES) encryption algorithm to the already available Rivest Cipher 2 (RC2) and Triple DES (Data Encryption Standard) (TDES) encryption algorithms. The IBM i V5R4 level IBM Redbooks publication IBM System i Security Guide for IBM i5/OS Version 5 Release 4, SG24-6668, remains available.




AIX V6 Advanced Security Features Introduction and Configuration


Book Description

AIX Version 6.1 provides many significant new security technologies and security enhancements. The purpose of this IBM Redbooks publication is to highlight and explain the security features at the conceptual level, as well as provide practical examples of how they may be implemented. Some features are extensions of features made available in prior AIX releases, and some are new features introduced with AIX V6. Major new security enhancements will be introduced with AIX V6 in 2007: - Trusted AIX (Multilevel Security) - Role Based Access Control (RBAC) - Encrypted File System - Trusted Execution - AIX Security Expert Enhancements This IBM Redbooks publication will provide a technical introduction to these new enhancements. The topics are both broad and very complex. This book will serve as an initial effort in describing all of the enhancements together in a single volume to the security/system hardening oriented audience.




IBM i 6.1 Technical Overview


Book Description

This IBM® Redbooks® publication introduces a technical overview of the main new features, functions and enhancements available in IBM i 6.1 (formerly called i5/OS® V6R1). It gives a summary and brief explanation of new capabilities and what has changed in the operating system, and also discusses many of the licensed programs and application development tools associated with IBM i. Many other new and enhanced functions are described, such as virtualization of storage, security, JavaTM performance, improved performance with IBM System StorageTM devices, backup and recovery, including base IBM i, Backup, Recovery and Media Services (BRMS). The book introduces the PowerHATM product, IBM Systems Director-based system management and an easier Web enablement. The information provided in this book will be useful for customers, Business Partners, and IBM service professionals involved with planning, supporting, upgrading, and implementing IBM i 6.1 solutions.




Exploiting IBM PowerHA SystemMirror V6.1 for AIX Enterprise Edition


Book Description

This IBM® Redbooks® publication positions the IBM PowerHA® SystemMirror® V6.1 for AIX® Enterprise Edition as the cluster management solution for high availability. This solution enables near-continuous application service and minimizes the impact of planned and unplanned outages. The primary goal of this high-availability solution is to recover operations at a remote location after a system or data center failure, establish or strengthen a business recovery plan, and provide separate recovery location. The IBM PowerHA SystemMirror Enterprise Edition is targeted at multisite high-availability disaster recovery. The objective of this book is to help new and existing PowerHA customers to understand how to plan to accomplish a successful installation and configuration of the PowerHA SystemMirror for AIX Enterprise Edition. This book emphasizes the IBM Power SystemsTM strategy to deliver more advanced functional capabilities for business resiliency and to enhance product usability and robustness through deep integration with AIX, affiliated software stack, and storage technologies. PowerHA SystemMirror is designed, developed, integrated, tested, and supported by IBM from top to bottom.




IBM i 7.1 Technical Overview with Technology Refresh Updates


Book Description

This IBM® Redbooks® publication provides a technical overview of the features, functions, and enhancements available in IBM i 7.1, including all the Technology Refresh (TR) levels from TR1 to TR7. It provides a summary and brief explanation of the many capabilities and functions in the operating system. It also describes many of the licensed programs and application development tools that are associated with IBM i. The information provided in this book is useful for clients, IBM Business Partners, and IBM service professionals who are involved with planning, supporting, upgrading, and implementing IBM i 7.1 solutions.




IBM PurePower Technical Overview and Introduction


Book Description

This IBM® RedpaperTM publication introduces and provides a technical overview of the IBM PurePower System that helps support management of big data, social media, mobile, analytics, and the flow of critical information. A PurePower System can be configured in an affordable entry-level configuration in a single rack, and it is agile enough to be expanded for scalable cloud deployments. It has built-in redundancy for highly reliable and resilient operation to support demanding applications and cloud services, as required by many enterprises. A PurePower System also provides the scalability, flexibility, and versatility that you demand for business-critical workloads. The following enhancements were announced in October 2015: IBM i operating system on top of a Virtual I/O Server (VIOS) now supported on the IBM Power System S822 server Improvements to PurePower Integrated Manager Integration of HMC code (virtual HMC) into the PurePower Integrated Manager Ability to order translated PurePower documentation that is geography-specific Configuration support for IBM Power System S822 and S822L server in a single rack PowerVC 1.2.3 Standard Edition Power compute node firmware SV840




International Joint Conference CISIS’12-ICEUTE ́12-SOCO ́12 Special Sessions


Book Description

This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at CISIS 2012 and ICEUTE 2012, both conferences held in the beautiful and historic city of Ostrava (Czech Republic), in September 2012. CISIS aims to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a through peer-review process, the CISIS 2012 International Program Committee selected 30 papers which are published in these conference proceedings achieving an acceptance rate of 40%. In the case of ICEUTE 2012, the International Program Committee selected 4 papers which are published in these conference proceedings. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference and the CISIS and ICEUTE conferences would not exist without their help.




Modernizing IBM i Applications from the Database up to the User Interface and Everything in Between


Book Description

This IBM® Redbooks® publication is focused on melding industry preferred practices with the unique needs of the IBM i community and providing a holistic view of modernization. This book covers key trends for application structure, user interface, data access, and the database. Modernization is a broad term when applied to applications. It is more than a single event. It is a sequence of actions. But even more, it is a process of rethinking how to approach the creation and maintenance of applications. There are tangible deliveries when it comes to modernization, the most notable being a modern user interface (UI), such as a web browser or being able to access applications from a mobile device. The UI, however, is only the beginning. There are many more aspects to modernization. Using modern tools and methodologies can significantly improve productivity and reduce long-term cost while positioning applications for the next decade. It is time to put the past away. Tools and methodologies have undergone significant transformation, improving functionality, usability, and productivity. This is true of the plethora of IBM tools and the wealth of tools available from many Independent Solution Providers (ISVs). This publication is the result of work that was done by IBM, industry experts, and by representatives from many of the ISV Tool Providers. Some of their tools are referenced in the book. In addition to reviewing technologies based on context, there is an explanation of why modernization is important and a description of the business benefits of investing in modernization. This critical information is key for line-of-business executives who want to understand the benefits of a modernization project. This book is appropriate for CIOs, architects, developers, and business leaders. Related information Making the Case for Modernization, IBM Systems Magazine




Performance Tuning for IBM Security Directory Server


Book Description

In today's highly connected world, directory servers are the IT cornerstone of many businesses. These components of the corporate infrastructure are the foundation of authentication systems for internal and, more commonly, external user populations. Managing a directory server with several hundred internal users is not all that difficult. However, managing a directory server with several million external users in all 24 time zones throughout the world is a much more daunting task. IBM® Security Directory Server software can handle millions of entries, given the right architecture, configuration, and performance tuning. However, that tuning can differ greatly from tuning for a smaller server with only a few hundred thousand entries. Managing and tuning a directory server of this size requires a change in mindset. Tuning and performance must be a focus even before the hardware is ordered. A proactive approach must be taken after installation also, including the pretuning steps to better interface with other products to make installations and migrations successful, and then regular maintenance to keep the directory running smoothly. This IBM Redbooks® publication is the accumulation of lessons learned in many different real-world environments, including a 24-server fault tolerant configuration with more than 300 million entries. The authors pooled their knowledge and resources to provide the most comprehensive performance view possible, from hardware to software, sort heaps to buffer pools, and table cardinalities. In large directory server deployments, use this document as a guide for how to get the right fit for your environment.




IBM i 7.2 Technical Overview with Technology Refresh Updates


Book Description

This IBM® Redbooks® publication provides a technical overview of the features, functions, and enhancements that are available in IBM i 7.2, including all the available Technology Refresh (TR) levels, from TR1 to TR3. This publication provides a summary and brief explanation of the many capabilities and functions in the operating system. It also describes many of the licensed programs and application development tools that are associated with IBM i. The information that is provided in this book is useful for clients, IBM Business Partners, and IBM service professionals that are involved with planning, supporting, upgrading, and implementing IBM i 7.2 solutions.