Overview

This course describes user profiles, the key element in establishing a user environment. The course begins with five interactive sessions, each of which discusses a collection of user profile options:
- Basic profile options
- Security options
- Group member options
- Job, message, and output options
- Environment options
You will see the purpose of each user profile field and the options available to you as the security administrator.
The course then describes the IBM i commands used to create and maintain user profiles. This part of the course begins with an introduction to the commands associated with user profiles and the authorities required to perform various user profile functions. You will then practice creating profiles in a simulated IBM i session. Next, you will practice displaying, changing, and deleting profiles. Finally, the course describes how to test a profile that you have created.
Approximate Study Time: 2.5 hours
Objectives
After completing this course, you should be able to:
- Predict the result of a sign-on attempt, given the current values of the appropriate fields in the user's profile
- Identify the differences between a group profile and the profile for a group member
- Identify the authority required to perform a given function on a user profile
- Code the user profile parameter to satisfy a given requirement
- Create, display, change, and delete a user profile
- Identify the steps you should perform to test a profile that you have created
Topic Outline
Basic User Profile Options
Security Options
Group Member Options
Job, Message, and Output Options
Environment Options
Commands for Working with User Profiles
Creating User Profiles
Using Profile Commands
Testing the Profiles You Have Created
Audience
The course is intended for the security officer or administrator who is responsible for enrolling new users on the system. It is also valuable for managers and other personnel who will participate in system security decisions.
Prerequisites
This course assumes that you are familiar with the concepts and basic operations of IBM i systems. You can satisfy these prerequisites by successfully completing the courses in the following series:
Finally, the course assumes that you have an understanding of IBM i security. You can satisfy this prerequisite by successfully completing the previous courses of this series:
- Introduction to IBM i Security
- Granting Object Authority
- Controlling Application Security
- System Security Considerations
You may also have obtained these skills by taking other courses or through relevant work experience.
Overview
|
Courses
|
Options
|
Combo Packs
|
Technical
|
Orders
|
Legal
|
Contact Us
|
Search
|
Glossary
© Copyright 2023 Manta Technologies. All Rights Reserved.