Solutions


System security provides the means to manage various users and groups and to implement access and privilege controls against operating system resources. AIX allows you to install, configure and deploy security mechanisms in the base operating system. It also provides a variety of authentication mechanisms to protect the system against unauthorized access.

System security
System security provides the means to manage various users and groups and to implement access controls and privilege controls against operating system resources.


Kerberos authentication
An AIX administrator can manage Kerberos-authenticated users and their associated Kerberos principals.

PKI certificate-based authentication
Certificate Authentication Service provides the AIX operating system with the ability to authenticate users using X.509 public key infrastructure (PKI) certificates and to associate certificates with processes as proof of a user's identity.

LDAP authentication
The Light Directory Access Protocol (LDAP) method is used to allow centralized security authentication as well as access to user and group information. This functionality is intended to be used as a centralized, global repository to keep authentication, user, and group information common across multiple hosts.

Pluggable authentication method (PAM) infrastructure
The pluggable authentication module (PAM) framework provides system administrators with the ability to incorporate multiple authentication mechanisms into an existing system through the use of pluggable modules. Applications enabled to make use of PAM can be plugged into new technologies without modifying the existing applications.

Enterprise Identity Mapping (EIM)
Today's network environments are made up of complex groups of systems and applications, resulting in the need to manage multiple user registries. Dealing with multiple user registries quickly grows into a large administrative problem that affects users, administrators and application developers. EIM can help.

Auditing
It is essential in a server environment that the system activities log be set up to monitor for unauthorized access. The AIX auditing subsystem enables the system administrator to record security-relevant information, which can be analyzed to detect potential and actual violations of the system security policy.

Related documentation

Additional AIX Security Tools on IBM eServer™ pSeries, IBM RS/6000 and SP/Cluster
This Redbook describes additional tools and techniques you can use to enhance the security of your pSeries environment.

Contact IBM

Browse Power Systems

Next generation applications for big data and analytics and cognitive computing are providing unprecedented insights into opportunities, threats and efficiencies. IBM Power Systems is at the forefront of delivering solutions to gain faster insights from analyzing both structured information and unstructured big data. With the secure, flexible and open platform of IBM Power Systems plus solutions and software, organizations can outpace their competitors by delivering faster services, providing differentiated offerings and turning operational cost into investment opportunity.

IBM Power Systems hardware is at the heart of enabling major business and industry transformations fueled by the explosive growth of big data and analytics. Power Systems help organizations drive faster business insights with industry leading performance, scalability and virtualization flexibility.

IBM Power Systems deliver flexibility and choice of operating systems to enable your business to support the next generation applications for big data and analytics and cognitive computing that are transforming how organizations work today. Whether running 1, 2, or all 3 - coupled with PowerVM, they maximize the benefit of Power Systems in your business.

IBM's integrated approach to developing Systems and Systems Software stacks together delivers a platform that supports next generation applications for big data and analytics and cognitive computing on an open platform for choice while providing maximum utilization, availability, and flexibility to help you deliver new advantages to your business.

IBM and IBM Business Partner solutions exploit key benefits in IBM Power Systems’ unique design combined with systems software to provide support for next generation applications for big data and analytics and cognitive computing to providing unprecedented insights into opportunities, threats and efficiencies to your organization.


Over the last five years thousands of clients have migrated to IBM Power Systems. Learn how Power Systems has helped them support next generation applications for big data and analytics and cognitive computing on an open platform for choice while improving business performance, reducing risk, and establishing a platform for growth.