IBM i User Profile Replication

What is iSecurity Replication?

Companies have found it mandatory that system administrators and users alike synchronize user profile definitions, user passwords and profile parameters between different IBM i systems, allowing for exceptions as needed in Production, Test or Development systems.

iSecurity Replication provides organizations with flexible user-defined IBM i replication rules for defining user profiles, passwords and parameters.

image
image

Synchronization accomplished with minimum system overhead and minimum administrator activity

image

Replication can be initiated from any IBM i & does not require any special commands

image

Allows organizations to set user profile definitions to optimal values or set site-defined baseline values

image

Allows administrators to revive and modify parameters for deleted users

image

Bulk updates of user profiles save time in changing global parameters

Features of iSecurity Replication

image

Rules Definition and Logging at Your Fingertips

Synchronization plans for user profiles and passwords are performed with full logging to minimize mistakes, using flexible user-defined replication rules for IBM Power Systems (including IBM i, AS/400, iSeries, and System i).

Easily Sync Across Multiple Systems

iSecurity Replication allows users to easily sync user profile definitions and user passwords across systems and LPARs. Allows for the simple defining of the source and target systems, including groups of systems.

image
image

Flexible Replication with exceptions, as needed

Replication exemptions can easily be created for IBM i servers where user profiles should not be synchronized with other systems, such as Production, Test or Development systems. Replication exemptions allow for flexible user profile synchronization that serves business needs.

Latest Blogs

image
IBM i
May 22, 2024
Hardware Security & Auditing Considerations for IBM i Servers
image
IBM i
May 10, 2024
Integrating IBM i Data with SIEM Solutions
image
IBM i
April 24, 2024
Using Exit Point Programming to Control IBM i Access

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW