Monthly Archives: June 2015

Each time you add a new user service to your computing environment, the password burden on your organization grows exponentially. Kerberos greatly simplifies password management, but understanding it is anything but simple. Most people find themselves dragged into depths of … Continue reading

Posted in Password Management, Single Sign-On (SSO) | Tagged , , , , | Leave a comment

I recently wrote a tip for IT Jungle that admonishes programmers to stop assuming that the “job user name” is the same user profile under which a job is currently executing.  The article provided examples of how to retrieve the … Continue reading

Posted in IBM i Security | Tagged , , | Leave a comment