Showing posts with label ibm i. Show all posts
Showing posts with label ibm i. Show all posts

Friday, April 02, 2010

What is IBM i Access for Web

What is IBM i Access for Web

IBM i Access for Web offers browser-based access to IBM i. IBM i Access for Web enables end users to leverage business information, applications, and resources across an enterprise by extending the IBM i resources to the client desktop through a web browser.

See the Customer Comments on IBM i Access products!

IBM i Access for Web...
is system based; there is no code running on the desktop.
is implemented using Java Servlet technology.
uses industry standard protocols - HTTP, HTTPS and HTML.
is lightweight, requiring only a browser on the client.
runs batch commands, provides access to database, integrated file system, printers, printer output, and messages, and a 5250 interface.


V5R4 iSeries Access for Web is supported on systems with V5R4 and V5R3 i5/OS TM. V5R3 iSeries Access Family (5722-XW1) customers can acquire V5R4 iSeries Access for Web and stay at V5R3 i5/OS. Refer to Ordering/Upgrading.
V5R4 and V5R3 iSeries Access for Web servlets are supported with these web application systems. Refer to the service pack PTFs page for PTF requirements:
Web application system integrated with i5/OS (V5R4 only)
WebSphere Application Server (WAS) - Express V6.1 for i5/OS, WAS V6.1 for i5/OS, and WAS V6.1 Network Deployment for i5/OS
WAS - Express V6.0 for OS/400 and WAS V6.0 for OS/400
WAS - Express for iSeries V5.1 and V5.0
WAS for iSeries V5.1 and V5.0 (Base and Network Deployment Editions)
Apache Software Foundation's Jakarta Tomcat (included with the IBM HTTP Server)


In addition to the above, the IBM i Access for Web portlet code can be used with any of the following portal systems:
IBM Workplace Services Express V2.6 and V2.5
WebSphere Portal for Multiplatforms V6.0
WebSphere Portal for Multiplatforms V5.1.0.1
WebSphere Portal Express for Multiplatforms V5.0.2
WebSphere Portal Express Plus for Multiplatforms V5.0

what is websmart

More details on IBM i Access for Web to follow...

Thursday, May 21, 2009

Raz-Lees new whitepaper - Achieving PCI Compliance with IBM Power i

Check out Raz-Lees new IBM i white paper - Achieving PCI Compliance with IBM Power i.

PCI-DSS consists of 12 requirements within six categories which cover best security practices. This white paper includes a summary of PCI requirements, focusing on the relevant items to Power i security. Each requirement is followed by a guideline specifying how to actually implement the requirement


http://systemisecurity.wordpress.com/2009/05/20/new-white-paper-pci-compliance-with-ibm-power-i/

Wednesday, May 06, 2009

Using the .Net toolset to develop desktop and Web-based applications for IBM i

Richard Schoen discusses using .Net to develop IBM i apps...

With a little education on how to use a technology like .NET to develop applications, a System i programmer can quickly write a graphical application on top of an existing System i solution. This adds a new user interface to important parts of an existing system or simply offers ease of access to existing ERP data from a Windows or Web-based inquiry


http://www.ibmsystemsmag.com/ibmi/october07/trends/17571p1.aspx

Thursday, April 30, 2009

IBM i & i5/OS Security & Compliance: A Practical Guide



Get a fresh look at the world of IBM i and i5/OS security in this comprehensive book by one of the industry s leading authorities on security. Security consultant Carol Woodbury takes her extensive experience designing and implementing security on IBM systems and makes it relevant for today s world. Throughout the book, she discusses issues that organizations need to address for compliance requirements, providing best practices as well as alternatives and options for compensating controls when best practices cannot be applied. Building on the foundation laid by the popular Experts Guide to OS/400 & i5/OS Security, this edition features completely updated information throughout. New chapters address compliance requirements for IBM i, implementing role-based access (RBAC), implementing object-level security, and creating a security incident response plan. Carol Woodbury s methodology for implementing object-level security is described in detail. Topics include determining a system s current settings, default access requirements, process access, and the rollout of new application security models. The book presents this information in a clear and informative way that lets even non-security professionals understand and apply the concepts. This book is a must-read for any auditor, system administrator, security officer, or compliance officer who works with IBM i or i5/OS.

Contents
Chapter 1: Security The Real Reason You re Reading This Book
Chapter 2: Policies and Procedures
Chapter 3: Security at the System Level
Chapter 4: The Facts About User Profiles
Chapter 5: Service Tools Security
Chapter 6: Object-Level Security
Chapter 7: Security Considerations for the IFS
Chapter 8: Securing Your Printed Output
Chapter 9: Encryption
Chapter 10: Connecting to the System
Chapter 11: Internet Security
Chapter 12: Evaluating Applications Current Implementations and Designing New Ones Chapter 13: Role-based Access (RBAC)
Chapter 14: Role-based Access for IT
Chapter 15: Auditing
Chapter 16: Implementing Object-Level Security
Chapter 17: Maintaining Compliance
Chapter 18: Preparing for the Worst: Creating a Security Incident Response Plan Chapter 19: Creating a Security Awareness Program


About the Author
Carol Woodbury is president of SkyView Partners, Inc., a firm she co-founded in 2002 that specializes in security policy compliance software and remediation services. Carol has worked in the field of security since 1990. She worked for IBM in Rochester, Minnesota, for 16 years, the last 10 of which were spent as team leader of the OS/400 security development team and chief engineering manager for AS/400 security. Carol is an award-winning speaker who speaks around the world on the topic of security. She is also an award-winning writer and serves as a technical expert on security topics for numerous publications