Join us in New Orleans, Louisiana for POWERUp 2026, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!
Sign up or log in to add sessions to your schedule and sync them to your phone or calendar.
The potential to break a critical process when changing your security configuration is real. But with the proper investigation and analysis, security changes can occur without disrupting your business. During this session Steve Riedmueller and Carol Woodbury will provide the methods they use to investigate a system prior to making changes. Their goal is to give you the confidence to make system value, user profile and object authority changes with confidence and without fear of breakage.
Learning Objectives:
Learn: - how to effectively communicate the need to make security changes. - which configuration changes can be made without a huge project - how and when to use the audit journal to perform analysis - about authority collection analysis