iSecurity is a leading solution for Power i, iSeries and AS/400 Security Learn More about iSecurity
 iSecurity Overview
 Market Need
 iSecurity Products A-Z  

  AP-Journal Business

  AP-Journal Regulation

  Authority on Demand
  Central Administration
  Compliance Evaluator
  Native Object Security
  System Control
  User & System Value Replication
  Visualizer for Audit
  Visualizer for Firewall
 Prevention Pack
 Compliance Pack
 Application Security Suite
 iSecurity GUI
 Scope Products
Overview Screens

iSecurity Authority on Demand

Flexible Control of User Authorities

iSecurity Authority on Demand provides an advanced solution for emergency access to critical application data and processes, which is one of the most common security slips in System i (AS/400) audits. Current manual approaches to such situations are not only error-prone, but do not comply with regulations and auditor's often stringent security requirements. View the different options for providing higher authority here.

Authority on Demand saves valuable time and resources, enforces segregation of duties and enables relevant personnel to obtain access to approved information when needed. Its real-time audit of access rights protects sensitive corporate assets and significantly reduces the number of profiles with powerful special authorities.

The product simplifies the process of granting special authorities when necessary, and incorporates easy-to-use reporting and monitoring mechanisms to ensure that this extremely sensitive and potentially dangerous capability is not misused. It also enables recovery from different types of emergency situations with minimum chances for human error.

View Authority on Demand Screens

iSecurity Authority on Demand Features

  • Provides users higher authority profiles on an as-needed basis based upon pre-defined rules
  • In addition to changing a user's authority level, a unique feature can ADD authority rights to a user's existing authority level, ensuring correct auditing of user's activities
  • Logs all product and requestor related activities as well as all user's activities while operating at higher authority, including screen shots, before and after data images, commands and more
  • Site-definable Email message alerts and SYSLOG messages
  • Capabilities for restricting requestors to particular dates, times, IP addresses, time span of higher authority and more
  • PIN number verification can be set per authority
  • Authority on Demand support in iSecurity GUI interface
  • User Exit Program can override AOD decision to allow or reject an authority request
  • Supports auditors who only report on AOD user activities and Emergency operators who provide limited, emergency access to rules definitions

Figure 1

Learn about related iSecurity products:

  Authority on Demand Data Sheet

  Authority on Demand Presentation

  Download Authority on Demand

   Quick Links
Download FREE Trial

Raz-Lee on YouTube

Raz-Lee on Twitter

Copyright © 2009 Raz-Lee Security. All rights reserved  
Terms & Conditions | Site Map