iSecurity is a leading solution for Power i, iSeries and AS/400 Security Learn More about iSecurity
 Products
 iSecurity Overview
 Market Need
 iSecurity Products A-Z  

  Action
  Anti-Virus
  AP-Journal Business
   Analysis

  AP-Journal Regulation
   Compliance

  Assessment
  Audit
  Authority on Demand
  Capture
  Central Administration
  Compliance Evaluator
  Field & PGP Encryption
  Firewall
  Native Object Security
  Password
  Screen
  System Control
  User System Value Replication
  Visualizer
 Prevention Pack
 Compliance Pack
 Application Security Suite
 iSecurity GUI
 Scope Products
Overview Screens

iSecurity User Profile & System Value Replication

Efficient Synchronization of Data

The recent trend of consolidating servers has led to the increasing prevalence of multi-system and multi-LPAR shops.

Companies have found it mandatory that system administrators and users alike synchronize user profile definitions, user passwords and system values between the different systems, allowing for exceptions as needed in Production, Test or Development systems. Such synchronization should be accomplished with minimum overhead to both the actual systems and the personnel mandated with managing user profile information.

View Replication Screens

View Demo - User & System Value Replication

iSecurity User Profile Replication Features

  • Flexible user-defined replication rules for defining user profiles, passwords and parameters to be replicated
  • Easily define "source" and "target" systems, including groups of target systems
  • Bulk updates of user profiles
  • Setting of System Values to optimal value or site-defined baseline values
  • Replication of all, group or individual system values
  • Collection & display of network-wide replication results
  • Revival of deleted users, with an option to modify parameters
  • Can be initiated from any system in the environment and does not require special commands
  • Intercepts CRTUSRPR, CHGUSRPR, DLTUSRPRF and CHGPWD commands

iSecurity System Value Replication Features

  • Handles system values - One at a time, By Type, *ALL
  • Set to:
    • A value
    • *BASELINE
    • *OPTIMAL

  • Apply to target system: *CURRENT, *Group, *ALL
  • Double confirmation for system *Group, *ALL
  • If set to *BASELINE (site snapshot of all system values), uses the baseline saved in each system.
  • If set to *OPTIMAL (best values as defined in Compliance Evaluator), uses the values set in the "source" system, taking into account exceptions defined in each "target" system

Learn about related iSecurity products:

Native Object Security
Action
Assessment
System Control

   Downloads
  User Profile & System Value Replication presentation

  iSecurity Data Sheet

  User Management Videos

   Quick Links
Download FREE Trial

Raz-Lee on YouTube

Raz-Lee on Twitter

Copyright © 2009 Raz-Lee Security. All rights reserved  
Terms & Conditions | Site Map