User Authority Provisioning

iSecurity Authority on Demand

iSecurity Authority on Demand (AOD) provides an advanced solution for granting special authority access (including *QSECOFR authority) to critical application data, processes, and OS functions.

AOD gives administrators the ability to automate granting special authority and permissions on a temporary basis, when necessary.

With full audit and reporting capabilities, a historical record will always be available.

iSecurity’s Capture product can be added as an option to further enhance historical records with automated screen captures.

image
image

Automates granting special authority access to IBM i users, including audit trail records and documentation

image

Users can request temporary access to pre-determined IBM i objects

image

Reduces Identity Access Management workload

image

Advanced auditing for change management

image

Reduces the need for multiple user accounts

Features of Authority on Demand

image

Predefined user authorities

iSecurity AOD provides a means to predefine which permissions or special authorities may be requested per user or group. Optionally, full profile swapping and additional global adoption is available to reduce requesting users’ workloads.

Full control over users with temporary elevated authorities

A wide range of parameters are included with each defined Provider, giving administrators full control over the requesting user authority usage. Providers can set Time Limits, Number of uses, Real Time Approvals and Pin Codes for maximum flexibility.

image
image

Full audit reporting for granting special authority access

Full audit reporting is included with iSecurity Authority on Demand. Change management and audit compliance requirements can be satisfied with automated delivery each time AOD is used. Audit trails can be enhanced with the optional Capture module. Automatically capture and deliver every screen when users have acquired AOD. A perfect historical record of what transpired during every AOD session.

Latest Blogs

image
IBM i
May 22, 2024
Hardware Security & Auditing Considerations for IBM i Servers
image
IBM i
May 10, 2024
Integrating IBM i Data with SIEM Solutions
image
IBM i
April 24, 2024
Using Exit Point Programming to Control IBM i Access

LET’S GET IN TOUCH

We’re happy to answer any questions about our software and what we do.

CONTACT US NOW