To learn more, visit https://www.helpsystems.com/resources...
Although your IBM i server is one of the most securable platforms available, experts know that the protection of critical data is often undermined by weak security design at the application level. Programmers building new applications tend to want to solve a business problem and roll out code quickly—and don’t get me started on all of the legacy code we all have to deal with!
In the second of this two-part webinar series, Robin Tatam combines his skills as a certified RPG developer with his IBM i security expertise. He covers the security considerations that native application programmers should be keenly aware of as they design their applications, including:
- Object ownership
- Adopted authority
- Public and private authorities
- Command line permission
- Client-server considerations
If you missed it, a recording of part one of IBM i Security for Programmers is available.
Watch video IBM i Security for Programmers PART 2 online without registration, duration hours minute second in high quality. This video was added by user Fortra 27 August 2019, don't forget to share it with your friends and acquaintances, it has been viewed on our site 76 once and liked it 0 people.