User & System Value Replication
What is iSecurity Replication?
The recent trend of consolidating servers has led to the increasing prevalence of multi-system and multi-LPAR environments. Companies have found it mandatory that system administrators and users alike synchronize user profile definitions, user passwords and system values between the different systems allowing for exceptions as needed in Production, Test or Development systems. Such synchronization should be accomplished with minimum overhead to both the actual systems and the personnel mandated with managing user profile information.
iSecurity Replication provides companies with flexible user-defined IBM i replication rules for defining user profiles, passwords and parameters.
Features of iSecurity Replication
iSecurity Replication provides companies with flexible user-defined IBM i replication rules for defining user profiles, passwords and parameters. iSecurity replication can be initiated from any IBM i in the customers environment and does not require any special commands. iSecurity Replication also provides users with the ability to collect and display network wide replication results as well as the ability to set systems values to an optimal value or site defined baseline values. Companies can also benefit from iSecurity Replication’s feature for revival of deleted users, with an option to modify parameters.
Rules Definition and Logging at your Fingertips
Easily Sync Across Multiple Systems
iSecurity Replication allows users to easily sync user profile definitions, user passwords and system values across systems and LPAR’s and allows for the simple defining of source and target systems, including groups of systems.