Steve Bradshaw

i-UG and Rowton IT

IBM i Authority Collection Service

Have you ever wondered what Security Permissions you actually need as a bare minimum in order to let your users do their job? Well, this is what this tool does, it monitors access to objects and logs what sort of access they need in order to use the applications they actually use, in the way they actually use them.

In short, no more guessing, no more giving users *CHANGE level access if they only need *USE and best of all no need to give users *ALL access just because you are not sure if one function they use might need it at some point.