23
Sat, Nov
1 New Articles

Security Patrol: Those Questions About User Profiles That You've Always Been Afraid to Ask

IBM i (OS/400, i5/OS)
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

Default Passwords

Q: How do I avoid default passwords on my system?

A: The best way to avoid default passwords is to not create profiles with default passwords. (Default passwords are passwords that are the same as the user profile name.) This usually requires a process change, because the Create User Profile (CRTUSRPRF) command defaults to create passwords that are the same as the user profile names. So you have two choices: You can demand that your administrators who create profiles create profiles with "real" passwords--that is, passwords that are not the same as the user name, or (my preference) you can change the command default for the password parameter of CRTUSRPRF to be *NONE rather than *USRPRF. That way, if the administrator forgets to change the password to a "real" password, the profile is created without a password and therefore cannot be abused. Creating a profile without a password is actually a good practice. The profile is only "activated" when the user's manager calls to get the password and then delivers it to the new employee. This practice avoids profiles being created for people who never actually join the company, which seems to be a problem in larger corporations.

If default passwords exist on the system, you can detect them using the Analyze Default Password (ANZDFTPWD) command, which produces a report of all the users with default passwords. In addition, it can either set these profiles to *DISABLED status and/or require the users to change their passwords the next time they sign on. Make sure to send the report to a secure output queue. You don't want the list of users with default passwords circulating around the company!

User Class Parameter

Q: What's the User Class parameter on CRTUSRPRF used for?

A: Not much. The system uses it to default the special authorities the user is going to have, but those can be overridden. OS/400 also uses the user class to determine which OS/400 menu options the user will be shown. Common to popular belief, it is not used during authority checking. At no time does OS/400 look to see what user class the user is in when determining if the user has sufficient authority to access an object.

Error Message CPI2224

Q: When I create a user profile, I sometimes get the error message CPI2224--User class and special authorities do not match system-supplied values. What does it mean, and should I be concerned?

A: What the message is trying to tell you is that the profile has been created with special authorities that do not match the special authorities that normally come with the user class the user is in. Default special authorities for each user class are shown in the table below.

User Class
Default Special Authorities
*USER
None
*SYSOPR
*SAVSYS, *JOBCTL
*PGMR
None
*SECADM
*SECADM
*SECOFR
*ALLOBJ, *AUDIT, *JOBCTL, *SPLCTL, *SAVSYS, *IOSYSCFG, *SERVICE


If your system is running at security level 20, all user classes have *ALLOBJ and *SAVSYS in addition to the other special authorities they have at higher security levels. This is one of the reasons that it's a really bad thing--from a security point of view--to run your system at security level 20!

When creating a profile, you can choose one user class and special authorities that totally differ from the defaults. For example, you can put a user in the SECOFR user class and remove all the special authorities. Or you can put users in the USER user class and give them all special authorities. Should you be concerned about getting the "mismatch" message? No. Your concern should be making sure you give the users only the special authorities required to perform their jobs.

Override System Values with Parameters

Q: Aren't there some user profile parameters that override system values? Which ones are they?

A: The Limit Device Session, Password Expiration Interval, and Display Sign-On Information parameters override the corresponding system value settings.

You'll most likely use the Limit Device Session parameter when you limit the users who can sign on to more than one session using the QLMTDEVSSN system value. You can then use the Limit Device Session parameter in the profiles of such users--e.g., operators, system administrators, and programmers--to allow them to be able to sign on to more than one device.

The Password Expiration Interval parameter may be used in a couple of ways. First, you can use them when you have processes, such as FTP, that run on a scheduled basis and have a password hard-coded into the FTP script or onto a PC hard drive. I do not recommend this practice, but it happens. In this case, the Password Expiration Interval parameter is used to specify the value of *NOMAX so that this password is not changed. Second, you may use it to require security officers and other powerful profiles to change their password more frequently than the rest of the users on the system. For example, the QPWDEXPITV can be set to 90, requiring users to change their passwords every 90 days. The security officers' profiles can use the Password Expiration Interval parameter to require their passwords to be changed every 30 days. I do recommend this practice.

The Display Sign-On Information parameter overrides the QDSPSGNINF system value. However, neither the system value nor the user profile parameter are very useful. In the case of iSeries Access for Windows, the value you see for the last sign-on date and time is about two seconds earlier. That's because you've signed on to the sign-on server before signing on to the Telnet server. The concept is a good one. When using this function, users are presented with the last sign-on date and time right after they sign on to the system. The idea is that users can monitor their information and therefore know if someone (other than themselves) has signed on to the system. Use of this function takes education--users must be informed to pay attention to this information and told what to do or who to call if something doesn't look right. This education rarely occurs. In fact, the reality is that most users are annoyed by this display because they are required to hit Enter again before getting to their application, and they totally ignore the information displayed. This, combined with the fact that you often don't get valid information anyway, tends to make me recommend not using this function. If you do use this function, turn it off at the system value and turn it on using the Display Sign-On Information parameter in the profiles of powerful users--users whose profiles, if compromised, will do the most damage.

Group Profile Parameters and Supplemental Group Profile Parameters

Q: What's the difference between the group profile parameter and the supplemental group profile parameter?

A: The group profile parameter defines the user's first group. You can define additional attributes for the first group, but no additional attributes are available for the supplemental groups. For example, you can specify the owner parameter to say that all newly created objects are owned by the group. (Unfortunately, most of the file systems don't honor this setting.) Or you can specify that ownership is retained but this group is to be given a private authority to anything that is created by this user. Honestly, I don't see this parameter in use very often and don't recommend its use because of the number of private authorities this has the potential of creating on the system. These additional attributes are the only things that distinguish the group profile from the supplemental groups. When defining group profiles in a user profile, I recommend that you specify them in the order of use. In other words, if the source of most authority comes from group ZZZ, define that group in the group profile parameter. If you define five group profiles for a user, don't define them in alphabetical order. During an authority check, OS/400 checks a user's groups in the order they're specified in the user's profile, with the profile specified for the group profile parameter being checked first.

Group IDs

Q: I tried to make a profile a member of a group profile, but I got a message saying that I couldn't because a group profile couldn't be a member of another group. I did a Display User Profile (DSPUSRPRF), specifying the *GRPMBR option to see the members of the profile. None were listed. What's going on?

A: Check to see if the profile has a Group ID (GID). A GID is a numeric representation of the user. Perhaps the profile was once a group. Even if you remove all of the members from a group, the GID remains. That, or perhaps someone explicitly defined a GID for the profile. In either case, you can specify GID(*NONE), and that should clear up the problem.


Carol Woodbury is co-author of the book Implementing AS/400 Security as well as co-founder of SkyView Partners, a firm specializing in security consulting and services. Carol has 13 years in the security industry, 10 of those working for IBM's Enterprise Server Group as the AS/400 Security Architect and Chief Engineering Manager of Security Technology. Carol recently authored iSeries security training videos that are now available for purchase at www.expertanytime.comCarol can be reached at This email address is being protected from spambots. You need JavaScript enabled to view it..


Carol Woodbury

 

Carol Woodbury is IBM i Security SME and Senior Advisor to Kisco Systems, a firm focused on providing IBM i security solutions. Carol has over 30 years’ experience with IBM i security, starting her career as Security Team Leader and Chief Engineering Manager for iSeries Security at IBM in Rochester, MN. Since leaving IBM, she has co-founded two companies: SkyView Partners and DXR Security. Her practical experience and her intimate knowledge of the system combine for a unique viewpoint and experience level that cannot be matched.

Carol is known worldwide as an author and award-winning speaker on security technology, specializing in IBM i security topics. She has written seven books on IBM i security, including her two current books, IBM i Security Administration and Compliance, 3rd Edition and Mastering IBM i Security, A Modern, Step-by-Step Approach. Carol has been named an IBM Champion since 2018 and holds her CISSP and CRISC security certifications.


MC Press books written by Carol Woodbury available now on the MC Press Bookstore.

IBM i Security Administration and Compliance: Third Edition
Don't miss the newest edition by the industry’s #1 IBM i security expert.
List Price $71.95

Now On Sale

Mastering IBM i Security Mastering IBM i Security
Get the must-have guide by the industry’s #1 security authority.
List Price $49.95

Now On Sale

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: