The use of encrypted sessions is both an effective way to prevent credential theft, as well as a requirement for numerous laws and regulations.
In this session, security expert Robin Tatam shows you how to configure the replacement for Client Access—Access Client Solutions—to use an encrypted (TLS) session.
This webinar will include an example of using your IBM i as a CA (Certificate Authority). You’ll also see an example of creating a request to send to a well-known CA to create the digital certificate you’ll need to assign to the servers to enable encrypted communications.
Robin is a CISM with two decades of AS/400 and IBM i consulting experience. He has a strong midrange background that includes programming in RPG and advanced CL, web enablement using CGI and IBM refacing products, as well as systems administration. An IBM-certified technical consultant, Robin conducts technical presentations online and at user group meetings, including COMMON, where he is a subject matter expert. He has written numerous articles for leading trade journals and was the co-author of the IBM Redbook, "IBM System i Security: Protecting i5/OS Data with Encryption."