Solved

How to Identify ODBC Users Connected to IBM iSeries?

Posted on 2011-09-02
6
2,154 Views
Last Modified: 2012-05-12
Is there a system log or a way to identify which users are connecting to the iSeries using ODBC?  For instance, a MS Access user who has a Client Access ODBC configuration set up to go against an iSeries library, how would I find him in any system log?  Our IT auditors want us to shut them out but before we do that wholesale, we'd like to find out who the users are so we can interview and assist them with an alternative to ODBC.
0
Comment
Question by:PROEUG
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
6 Comments
 
LVL 18

Accepted Solution

by:
Dave Ford earned 125 total points
ID: 36475730

There is usually a dedicated subsystem for these kind of connections. It's usually called QUSRWRK (or something approximating that). In that subsystem, any ODBC or JDBC job will be named QZDASOINIT. By inspecting those QZDASOINIT jobs, you can determine who's accessing your data via ODBC or JDBC.

HTH,
DaveSlash
0
 

Author Comment

by:PROEUG
ID: 36475970
Thanks Dave.  We have always suspected these jobs were ODBC related but could not always find a user ID that was truly a human user versus some other service or process that attached to the iSeries, i.e. replication services.  I don't suppose IBM could make my life easier by providing a log - besides QZDASOINIT job logs - specific to ODBC/JDBC?  The current QZDASOINIT job logs only go back a few days and I need something that spans a year in order to ID all possible users even if they have not connected within the past week.

Got anything else up your wizard's sleeves?
0
 

Author Comment

by:PROEUG
ID: 36476162
Dave and others,

Never mind.  Dave's suggestion led me on the right track as far as having a manual way to track ODBC users.  Just found out the client recently purchased PowerTech soltware which allows them to report network usage and that has the log they needed.
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

 
LVL 35

Expert Comment

by:Gary Patterson
ID: 36476217
QIBM_QZDA_INIT Exit Point can be used to capture this information.  This is that the PowerTech product does.  Here is a link to a simple little exit point program for this:

http://www.itjungle.com/fhg/fhg112906-story02.html

Note that the ODBC/JDBC jobs are QZDASOINIT (non-SSL connections) and QZDASSINIT (SSL-connections).

- Gary Patterson
0
 

Author Comment

by:PROEUG
ID: 36476241
Thanks Gary.   My director was just asking if there was a way to track these ODBC users and you and Dave have provided good evidence that there are.  Just depends on how much work one wants to do to get at the data.  This client's solution was to purchase one rather than build.  But it's good to know there are many ways for providing that solution.  Just surprised IBM didn't have something already built into the system for this.

Thanks again.
0
 
LVL 35

Expert Comment

by:Gary Patterson
ID: 36476379
IBM does:  They are called Exit Points.  :-)

I do security consulting work, and I generally recommend that clients purchase a package, too.  It is a lot of work to cover all the exit points that need to be covered, and track new ones as they get added, plus develop the audit reports, etc.  

Better to let an ISV do it for you.

- Gary Patterson
0

Featured Post

NFR key for Veeam Agent for Linux

Veeam is happy to provide a free NFR license for one year.  It allows for the non‑production use and valid for five workstations and two servers. Veeam Agent for Linux is a simple backup tool for your Linux installations, both on‑premises and in the public cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Network ports are the threads that hold network communication together. They are an essential part of networking that can be easily ignore or misunderstood, my goals is to show those who don't have a strong network foundation how network ports opera…
Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Suggested Courses

622 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question