Security Of Your Operations Console Configuration - IBM System i Manual

Connecting operations console
Hide thumbs Also See for System i:
Table of Contents

Advertisement

Security of your Operations Console configuration

Operations Console security consists of service device authentication, user authentication, data privacy,
and data integrity.
An Operations Console local console directly attached to the server has implicit device authentication,
data privacy, and data integrity because of its point-to-point connection. User authentication security is
required to sign on to the console display.
The following list gives you an overview of your Operations Console LAN security as shown in Figure 1
on page 14.
1. A user enters the correct password.
2. Operations Console sends the service tools device ID (QCONSOLE) and its encrypted password to the
system.
3. The system checks the two values. If they match, the system updates both the device and DST with a
newly encrypted password.
4. The connection process then validates the service tools user ID and password before sending the
system console display to the PC.
13
Operations Console

Advertisement

Table of Contents
loading

Table of Contents