While the IBM i is more securable than distributed systems, it is still vulnerable to potential security risks. This is especially true as you modernize the applications through API creation to engage the data and applications that live on the system. In this session, we’ll discuss how you can build out a layered defense against security threats, including integrating IBM i with your existing enterprise SSO architecture.
Learning Objectives:
- *Why IBM i specific security is critical and how to convince the business it should be part of the security policy
- *How to set up MFA for IBM i using Rocket MFA
- *How to integrate MFA into your applications like terminal emulation
- *How to integrate Rocker MFA with your SSO infrastructure