Presentation on theme: "ISecurity User Profile & System Value Replication."— Presentation transcript:
iSecurity User Profile & System Value Replication
Power i User Profile Replication Log Showing Statistical info: Sent, Done, Errors, Wait As well as each sent request in full iSecurity Standard User Profile Replication Power i User Profile Power i User Profile Report Replication Rules: Decide Destination Power i Replication Auto Interception of: CRTUSRPRF CHGUSRPRF DLTUSRPRF CHGPWD Power i User Profile
iSecurity User Profile/Password Replication - Features Flexible user-defined replication rules defining user profiles, passwords and parameters to be replicated Definition of destination system(s) for replication Bulk updates of user profiles Setting of System Values to optimal value or site-defined baseline values Replication of all, group or individual system values Collection & display of network-wide replication results Revival of deleted users, with an option to modify parameters Can be initiated from any system in the environment and does not require special commands
Mass Update Command
Network Wide Replication Results Collected
Keeps List of Deleted Users
Possibility to Modify Parameters
Specific Command CHGAUSV
Network Wide Results Collected
Replication Options on GUI Navigator Tree
Replicate Users Dialog Box
Revive Deleted Users Dialog Box
System Values Table and Dialog Box Current, Optimal (as set in Compliance Evaluator) and Baseline (as saved in the past) values displayed. New value, Optimal Value or Baseline value can be set.
User replication rules table. Specific operations and common attributes can be selected.
Replication history log including target system, result and actual CHGUSRPRF command invoked.