iSecurity is a leading solution for Power i, iSeries and AS/400 Security Learn More about iSecurity
 iSecurity Overview
 Market Need
 iSecurity Products A-Z  

  AP-Journal Business

  AP-Journal Regulation

  Authority on Demand
  Central Administration
  Compliance Evaluator
  Field & PGP Encryption
  Native Object Security
  System Control
  User System Value Replication
 Prevention Pack
 Compliance Pack
 Application Security Suite
 iSecurity GUI
 Scope Products
Overview Screens

iSecurity User Profile & System Value Replication

Efficient Synchronization of Data

The recent trend of consolidating servers has led to the increasing prevalence of multi-system and multi-LPAR shops.

Companies have found it mandatory that system administrators and users alike synchronize user profile definitions, user passwords and system values between the different systems, allowing for exceptions as needed in Production, Test or Development systems. Such synchronization should be accomplished with minimum overhead to both the actual systems and the personnel mandated with managing user profile information.

View Replication Screens

View Demo - User & System Value Replication

iSecurity User Profile Replication Features

  • Flexible user-defined replication rules for defining user profiles, passwords and parameters to be replicated
  • Easily define "source" and "target" systems, including groups of target systems
  • Bulk updates of user profiles
  • Setting of System Values to optimal value or site-defined baseline values
  • Replication of all, group or individual system values
  • Collection & display of network-wide replication results
  • Revival of deleted users, with an option to modify parameters
  • Can be initiated from any system in the environment and does not require special commands
  • Intercepts CRTUSRPR, CHGUSRPR, DLTUSRPRF and CHGPWD commands

iSecurity System Value Replication Features

  • Handles system values - One at a time, By Type, *ALL
  • Set to:
    • A value
    • *OPTIMAL

  • Apply to target system: *CURRENT, *Group, *ALL
  • Double confirmation for system *Group, *ALL
  • If set to *BASELINE (site snapshot of all system values), uses the baseline saved in each system.
  • If set to *OPTIMAL (best values as defined in Compliance Evaluator), uses the values set in the "source" system, taking into account exceptions defined in each "target" system

Learn about related iSecurity products:

Native Object Security
System Control

  User Profile & System Value Replication presentation

  iSecurity Data Sheet

  User Management Videos

   Quick Links
Download FREE Trial

Raz-Lee on YouTube

Raz-Lee on Twitter

Copyright © 2009 Raz-Lee Security. All rights reserved  
Terms & Conditions | Site Map