Some system functions provide an exit so that your system can run a user-created program to perform additional checking and validation. For example, you can set up your system to run an exit program every time that someone attempts to open a DDM (distributed data management) file on your system.
Type of exit programs | Purpose | Where to find examples |
---|---|---|
Password validation | The QPWDVLDPGM system value can specify a program name or indicate that validation programs registered for the QIBM_QSY_VLD_PASSWRD exit point be used to check a new password for additional requirements that are not handled by the QPWDxxx system values. The use of this program should be carefully monitored because it receives unencrypted passwords. This program should not store passwords in a file or pass them to another program. |
|
PC Support/400 or Client Access access1 | You can specify this program name in the Client request access (PCSACC) parameter of the network attributes to control the following functions:
| An Implementation Guide for iSeries Security and Auditing, GG24–4200 |
Distributed Data Management (DDM) access | You can specify this program name in the DDM request access (DDMACC) parameter of the network attributes to control the following functions:
| An Implementation Guide for iSeries Security and Auditing, GG24–4200 |
Remote sign on | You can specify a program in the QRMTSIGN system value to control what users can be automatically signed on from which locations (pass-through.) | An Implementation Guide for iSeries Security and Auditing, GG24–4200 |
Open Database Connectivity (ODBC) with iSeries Access1 | Control the following functions of ODBC:
| None available |
QSYSMSG break handling program | You can create a program to monitor the QSYSMSG message queue and take appropriate action (such as notifying the security administrator) depending on the type of message. | An Implementation Guide for iSeries Security and Auditing, GG24–4200 |
TCP/IP | Several TCP/IP servers (such as FTP, TFTP, TELNET, and REXEC) provide exit points. You can add exit programs to handle log-on and to validate user requests, such as requests to get or put a specific file. You can also use these exits to provide anonymous FTP on your system. | TCP/IP User Exits in the iSeries System API Reference book |
User profile changes | You can create exit programs for the following user profile commands: CHGUSRPRF CRTUSRPRF DLTUSRPRF RSTUSRPRF |
|