Guide to IBM i Multi-Factor Authentication - Ken McCalister
It seems that everyone—the government, regulators, insurance companies, enterprise security teams—is now requiring Multi-Factor Authentication (MFA) for IBM i system access.
But how do you start enabling IBM i MFA, such that every necessary IBM i login is verified and protected using MFA?
Join SEA where we present the Complete Guide to IBM i Multi-Factor Authentication. We’ll discuss everything you need to know about implementing MFA verification on all your IBM i systems, including:
- Why IBM i MFA verification is important
- Key considerations for implementing IBM i MFA
- IBM i MFA options: native functionality, third-party apps and open source
- Implementing MFA sign-ins for key server access, including system logins, remote access, password resets, ODBC, SQL, and more
- MFA reporting and auditing needs
*BONUS* Each attendee will receive a copy of SEA’s new resource, Guide to IBM i Multi-Factor Authentication, compiled by SEA’s IBM i MFA & Security Experts.
Software Engineering of America
Ken McCalister has spent 35 years working with IBM i technology . Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients.