IBM i Authority In the IBM i environment, you can encounter situations where different users require varying levels of authority to access objects or applications. IBM i authority settings can seem a little daunting to new admins, but they grounded in decades of real world usage and were so well designed they really have changed

Read More

Not dying users, you big silly! Are your IBM i Users Passwords Expiring? Every IBM i User Profile can be created with an automatic expiration date set against it. This forces regular password changes. Pretty standard stuff right? This is rarely a problem for interactive users – who will see the change password screen: But,

Read More

IBM i User Information is easy with SQL USER_INFO If you’re working with IBM i and need to retrieve information about user profiles, you can use the USER_INFO view. This view provides details about various aspects of user profiles. Here are some key columns from the USER_INFO view: You can query this view using SQL

Read More

What is an RPG language HELLO WORLD program? A “Hello, World!” program is a simple computer program that outputs or displays the iconic phrase “Hello, World!” to a user. This humble program serves as a fundamental introduction to programming languages and illustrates their basic syntax. Let’s explore this tradition further: The “Hello, World!” program typically

Read More

How can we Lockdown SQL Access for IBM i Users? Administrators often want to limit what SQL statements a user is allowed to run because how powerful SQL can be. What’s Different about SQL? SQL is a separate interface to the data and runtime SQL is part of the basic operating system. SQL uses the

Read More

IBM i ACS (1.1.9.4) was recently released and has some good new stuff! IBM i Access Client Solutions (ACS) is a software package that provides a platform-independent interface to IBM i systems. The latest version of IBM i ACS is 1.1.9.4, which was released in November 2023. This version includes several enhancements and critical security

Read More

IBM i HTTP Web Server Authentication using an IBM i User Profile and Password We tend to think of consuming a webservice (“connecting and reading from a webservice”) as something that is open to the public. But what if we want to add an extra level of authentication? How about we force the connection to

Read More

Serve JSON Web Services with RPG and YAJL aka — Access data running on other computers with REST and JSON This is a ressurection of an old article which was lost from the internet when iPro Developer died. Luckily I found an old PDF printout and dutifully copy/pastedf all the text. Thanks to Scott Klement

Read More

RPG Subprocedure Tips and Techniques The use of subprocedures in your applications should be on everyone’s “to do” list this year. You don’t need to drop everything and rewrite your applications to take advantage of subprocedures and many other benefits that the Integrated Language Environment (ILE) offers.  However, when writing new applications or performing major

Read More

Comparing Object Authorities across different libraries is easier than you think! Using the magical powers of IBM i SQL we can easily create a spreadsheet containing all the objects in any given library and showing all their authority settings. You can run this SQL statement using green screen STRSQL or from your favorite desktop SQL

Read More

Control Command Line Access Here is a brief guide on how to control command line access for IBM i users: IBM i User Limited Capability Feature The Limit Capabilities feature in IBM i allows you to control the ability of a user to run CL commands at a command line by specifying the LMTCPB (Limit

Read More

Have you ever seen a ‘Library QTEMP not found’ error? Weird Huh? After some head scratching we figured it out – this IBM i Power System is using an Independent Auxiliary Storage Pool (aka iASP). The previous administrators had installed and configured the iASP, but then decided to change the core IBM i System commands

Read More