Solved

Restrict FTP & ODBC Access

Posted on 2015-01-16
1
259 Views
Last Modified: 2015-01-16
Is there an easy way in V7R1 to restrict FTP access to only a certain user or set of users within the iSeries?  We currently have FTP open to all users on the system - but I would like to restrict this so only a pre-defined user (or group of users) can access FTP.

The same goes for ODBC?

Any help would be much appreciated.

Thanks,
0
Comment
Question by:Matthew Roessner
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 35

Accepted Solution

by:
Gary Patterson earned 500 total points
ID: 40554073
IBM has coded exit points into most system service like FTP and ODBC.  These exit points allow end users to register a program or programs to be called when key events occur in each service - for example during FTP or ODBC login.

Exit points:  http://iprodeveloper.com/security/whats-all-about-exit-points-and-exit-programs

Here's an exit point program for FTP that can be modified to restrict access in any way you like:

http://www.securemyi.com/nl/articles/Exit%20Program%20FTP.html

Here's a simple exit point program for ODBC that you can adapt to your needs.

http://www.itjungle.com/fhg/fhg112906-story02.html

A number of vendors also sell exit point packages that allow you to easily create groups and secure most of the services in the system.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Check out this step-by-step guide for asking an anonymous question on Experts Exchange.
The goal of this blog is to: > note what has impeded us from reaching effective life on-call > provide 3 steps to mastering life on-call > highlight what will be achieved with effective life on-call
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question