Security
of
your
Operations
Console
configuration
Operations
Console
security
consists
of
service
device
authentication,
user
authentication,
data
privacy,
and
data
integrity.
An
Operations
Console
local
console
directly
attached
to
the
server
has
implicit
device
authentication,
data
privacy,
and
data
integrity
because
of
its
point-to-point
connection.
User
authentication
security
is
required
to
sign
on
to
the
console
display.
The
following
list
gives
you
an
overview
of
your
Operations
Console
LAN
security
as
shown
in
1.
A
user
enters
the
correct
password.
2.
Operations
Console
sends
the
service
tools
device
ID
(QCONSOLE)
and
its
encrypted
password
to
the
system.
3.
The
system
checks
the
two
values.
If
they
match,
the
system
updates
both
the
device
and
DST
with
a
newly
encrypted
password.
4.
The
connection
process
then
validates
the
service
tools
user
ID
and
password
before
sending
the
system
console
display
to
the
PC.
Operations
Console
13
Summary of Contents for System i
Page 1: ...System i Connecting to System i Operations Console Version 5 Release 4 ...
Page 2: ......
Page 3: ...System i Connecting to System i Operations Console Version 5 Release 4 ...
Page 8: ...vi System i Connecting to System i Operations Console ...
Page 120: ...112 System i Connecting to System i Operations Console ...
Page 124: ...116 System i Connecting to System i Operations Console ...
Page 125: ......
Page 126: ... Printed in USA ...