Trusted Access Manager for Z

 View Only

Search Community

Latest Discussions

  • Profile Picture

    IDEA for NIM UI

    NIM UI should Authenticate against an approved Enterprise directory (For example: ACF2, RACF, AD, LDAP, etc.....) and not use local Authentication. Access to the NIM UI should have MFA enabled and be only through a Privileged Access Management software ...

  • Privileged users are targets of cyber criminals seeking to leverage the privileged accesses that these IDs may contain (e.g. 24x7 access to IBM RACF SPECIAL or group-SPECIAL). Consequently, they are also a large focus in audits. Too often organizations ...

Unanswered Threads

  • Profile Picture

    IDEA for NIM UI

    NIM UI should Authenticate against an approved Enterprise directory (For example: ACF2, RACF, AD, LDAP, etc.....) and not use local Authentication. Access to the NIM UI should have MFA enabled and be only through a Privileged Access Management software ...

  • Privileged users are targets of cyber criminals seeking to leverage the privileged accesses that these IDs may contain (e.g. 24x7 access to IBM RACF SPECIAL or group-SPECIAL). Consequently, they are also a large focus in audits. Too often organizations ...