
Sécurité

- Restreindre la sécurité à certains comptes sur certaines machines
Le principe est de créer une table de permissions et de gérer les permissions dans la procédure stockée.
- Supprimer le compte root en global
Supprimer la possibilité d’utiliser un compte root à partir de la base Autosys. A noter que la ligne de DENY_ACCESS dans le fichier /etc/profile marche très bien. # DENY_DENY_ACCESS=root #
Pour une configuration plus poussée, Jonathan McAlroy fournit une gestion des utilisateurs pluspoussée : Restreindre la sécurité à certains comptes sur certaines machines.
Dossier
Administration
Accès rapide
Generic analytics tools are killing ROI
Businesses are investing billions in analytics tools, hoping to derive meaningful insights to inform decision making. Yet, the reality is that getting truly valuable insights… The post Generic analytics tools are killing ROI appeared first on (...)
31 janvier 2017
source : Identity and Access Management (IAM)
Your house, both at work and home, requires security
Company slogans and brand taglines always fascinate me in the way they evoke instant empathy and emotion if done well. The Under Armour® brand is… The post Your house, both at work and home, requires security appeared first on Highlight. (...)
12 janvier 2017
source : Identity and Access Management (IAM)
Mainframe and the inevitable attack of the Internet of Things
I first wrote about the risks that the Internet of Things (IoT) portended back in 2014. Even then, it was obvious the rush to commercialize… The post Mainframe and the inevitable attack of the Internet of Things appeared first on Highlight. (...)
12 décembre 2016
source : Identity and Access Management (IAM)
The Modern Software Factory: What it is and why you need one
Digital disruption. Compressed innovation cycles. New forms of competition. Rising customer expectations. Increasing cost pressures. Today’s enterprises are facing unprecedented challenges and they have less… The post The Modern Software (...)
17 novembre 2016
source : Identity and Access Management (IAM)
The Modern Software Factory: What it is and why you need one
Digital disruption. Compressed innovation cycles. New forms of competition. Rising customer expectations. Increasing cost pressures. Today’s enterprises are facing unprecedented challenges and they have less… The post The Modern Software (...)
17 novembre 2016
source : Identity and Access Management (IAM)
A voir sur le net
- Identity and Access Management (IAM)
Focusing on our views about deployment challenges, and some of the important trends related to Identity and Access Management