Skip to content
  • Articles
  • About API – my my

Articles on Apis

APIs by Example

Written by Carsten FlensburgNovember 9, 2005August 26, 2017

Seek and Destroy Those Dormant User Profiles

Dormant and obsolete user profiles need to be managed. Normally, that means you need to delete them, but you should at least be sure they’re disabled. If you are grappling with SOX or HIPAA compliance, here’s a relevant section from COBIT. COBIT is what your auditors use as a guideline for evaluating your internal controls.

COBIT DS5.4 User Account Management
“Management should establish procedures to ensure timely action relating to requesting, establishing, issuing, suspending, and closing of user accounts.”

You can get the entire lowdown on COBIT at http://www.isaca.org

In this issue, Carsten provides a great new command that can help you implement controls over dormant user profiles. It’s similar to the IBM command ANZPRFACT(Analyze Profile Activity), but it has some nice added capabilities.

Download the save file containing the source code.

Read the entire article

Share this:

  • Twitter
  • Facebook

Like this:

Like Loading...
Posted in Security, Systems management, User profile.

Leave a Reply Cancel reply

Fill in your details below or click an icon to log in:

Gravatar
WordPress.com Logo

You are commenting using your WordPress.com account. ( Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. ( Log Out /  Change )

Cancel

Connecting to %s

Archives

Category

API usage Application modernization Commands Cross reference Cryptographic services Database file Data queue Date and time Digital certificate manager Display file Document conversion DSM eBook Environment variables Exit points Hardware Help panel IFS Job Job accounting Job queue Job scheduler Job screen Journal LAN Locales Messages MI Module information NetServer Object Object authority Object locks Output queue PEX Printer Programs PTF Query Retrive journal entries RPG Save & restore Security SMTP Spooled files SQL Subsystem Systems management TCP/IP Tips Track exports Trigger UIM User profile User spaces Validation lists Watch definition Workload capping groups Work management XML ZIP

Blogroll

  • Scott Klement's site
  • Dan Riehl's site
  • Lillian Boutté
  • Anette Harboe Flensburg
  • Eamon O'Kane

Post navigation

Previous Post A Boo-tiful New Tool to Manage PTFs
Next Post APIs by Example: Cryptographic Services APIs, Part 2
Blog at WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Articles on Apis
    • Already have a WordPress.com account? Log in now.
    • Articles on Apis
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
%d bloggers like this: