Users of a program.

pts.
Tags:
AS/400
DataCenter
Security
I'm trying to get a list of programs that a users access over a particular period (for security reasons. I've tried Job Accounting but that doesn't give me the correct info. Journaling also doesn't seem to give programs used by user. Any help would be appreciated. Regards

Answer Wiki

Thanks. We'll let you know when a new response is added.

Try the Audit journal. This is specifically made to follow access to whatever you want. In the following link

http://publib.boulder.ibm.com/iseries/v5r1/ic2924/index.htm

you can find under chapter Security the complete guidelines about Auditing.

===============================================================

Yoiu can do this by enabling object auditing and setting the attribute on for all programs on your system. Use CHGOBJAUD to set attributes on the program object.

But the idea is totally nuts.

Your system would be buried under audit log entries in no time. Do you have the slightest clue how many programs are called by your users in, say, a one-hour work period? Imagine a table update then ran through a hundred thousand rows of a table updating a column… with a trigger attached. And are you only going to track your own apps? Or would “security” require tracking any calls to operating system programs too? How about DB2 programs? System programs that wrote to display screens? Would you track QT3REQIO?

The request to audit program accesses is insane. (Every time an audit transaction is created, multiple programs are called. Each one would generate audit transactions, each one of which would call multiple programs, etc., etc., etc…)

I <b>have</b> to assume that you are referring <b>only</b> to a very limited list of important application programs. If so, CHGOBJAUD will do it. Otherwise, whoever made the request is nuts.

Tom

Discuss This Question: 1  Reply

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Teandy
    If you are worried about security, then the first thing I would do would be to make sure that the user profile in question only has user authority, no ALLOBJ, SECADM, IOSYSCFG, etc, etc, etc.... The next thing I would do would be to secure all programs that access sensitive data either by user or by authorization list. These are only two things off the top of my head and certainly not everything that should be considered.
    5,860 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following