From a security perspective, IBM I provides three levels of security protection: physical security, logon security, and resource security. Physical security is from the hardware perspective, primarily involving the protection of IBM I data storage media; Logon security is user-centric, restricting who accesses IBM I and what to do after logging in; Resource security is about resources such as IBM I objects and files, protecting files, object and the data in the object to avoid illegal access. On the other hand, as a set of Java application programming interfaces, IBM Java Toolbox for I is primarily used to access IBM I data and resources. For a basic knowledge of IBM Java Toolbox for I, see another technical document "Toolbox for Java and Jtopen." The main objective of this paper is to instruct readers how to use IBM Java Toolbox for I to manage the rights of users, objects and files from the perspective of login security and resource security from the point of view of programming. Physical security is not covered in this article.
From the structure, this article mainly divides into 3 parts. The first part mainly from the perspective of user rights, the IBM Java Toolbox for I to the IBM I login security programming support; In the second part, we will introduce the IBM Java Toolbox for IBM from the perspective of Object permissions and IFS file permissions respectively I's programming support for resource security. The last part is the summary.
To facilitate the reader's understanding, this article gives the sample, whose description is shown in table 1: