|
Bryan, I have only tested one package - sadly I do not have any docs around, and my memory is too full to keep that stored away - But - set-up normally is not too bad, and you should get tech support to help you through it. I would say you could have a typical one up and running with-in 2-3 hours. Normally you restrict "all" ODBC and then start entering whom to allow as you "find-out" who cannot get to their files any longer. This does make for an on-going "project" but this formula does lock down your box the tightest it can be. That said - "IF" you have only a few things you want to lock down, you could grow your own - we have done that here with FTP. The first time is a little "weird" for some to get used to the steps - its not rocket science, just a different level of coding, closer to the bare metal. Your statement of menu level security, I would also ask, and exit point vendors should ask too, what level of security are you currently at? Resource level security and exit point "security" can be implemented separately, but be careful if you put into place exit point first, and "accidentally" lock down resource security later on too tightly so that the exit point programs won't run. -----Original Message----- From: midrange-l-bounces@xxxxxxxxxxxx [mailto:midrange-l-bounces@xxxxxxxxxxxx]On Behalf Of Burns, Bryan Sent: Friday, May 23, 2003 10:23 AM To: 'MIDRANGE-L@xxxxxxxxxxxx' Subject: Buying an Exit point program We use menu level security on our iSeries, not resource or object level security, and are looking into buying an exit point program. What kind of set-up is involved in exit point programs? We are wondering what kind of time we need to devote to the process of securing our files from ODBC, Client Access transfers, etc. with an exit point program. Secondly, do we need to implement resource level security on the iSeries to take advantage of an exit point program? We can implement an exit point program first and then tighten up security on the iSeries later, correct? Bryan Burns System Operator ECHO Incorporated Lake Zurich, Illinois 847-540-8400 ext. 493 _______________________________________________ This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/midrange-l or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.