Field Name

Description

 

 

 

 

 

 

 

 

 

 

 

Authority

Specifies

the

authority

given

to

users

who do

not have

spe

 

to the overlay,

who are

not on

the authorization

list, and

wh

 

group

has

no

specific authority

to

the

overlay.

 

 

 

 

Note:

This

value

is ignored and the current authority remains

 

are

replacing

an

existing

overlay.

 

 

 

 

 

You can specify the following values for this parameter:

*LIBCRTAUT

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The system determines the authority for

 

the

overlay

 

using the value specifiedCreateon theauthorityprompt

 

 

 

 

 

 

(CRTAUT parameter) on the Create Library command

 

 

 

(CRTLIB) for the library containing the overlay to be

 

created. If the value specifiedCreate authorityon the

 

 

 

 

prompt

(CRTAUT

parameter)

is

changed,

the

 

new

value

 

will not affect any existing

overlays.

 

 

 

 

 

*CHANGE

Change

authority

allows

the

user

 

to

perform all

opera

 

on the overlay except those limited to the owner or

 

controlled by object existence authority and object

 

management

authority. The

user

can

change

the

overlay

 

and perform basic functions on the overlay. Change

 

authority provides object operational authority and a

 

authority.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

*ALL

All authority

allows the

user

to

 

perform

all

operations

 

overlay except those limited to the owner or controll

 

authorization list management authority. The

 

user

contro

 

the existence of the overlay, specifies the securi

 

overlay,

changes

the

overlay,

and

performs

basic

func

 

on the overlay. The user cannot transfer ownership of

 

overlay.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

*USE

Use

authority

allows

the user

to perform

basic

ope

 

on the overlay, such as

run

 

a

program or

read

 

a f

 

user is prevented from changing the overlay. Use aut

 

provides object operational authority, read authority

 

execute

authority.

 

 

 

 

 

 

 

 

 

 

 

 

*EXCLUDE

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Exclude authority prevents the user from accessing th overlay.

Authorization-list-name

Specifies the name of the authorization list that is secure the overlay object to be created.

An overlay is created from a source overlay. The source overlay cons

ŸOverlay specifications

ŸFont information

ŸElement definitions

Press the Enter key to create the overlay. When the overlay object

successfully,

the Work with Source Overlays display or the screen be

with

Source

Overlays

display appears with a message

at

the bottom

It

depends

on the

valueReturnof tothesource overlaypromptlistin

the

Exit

Overlay display.

If any error is found in the input parameters or in the resource screen, the field which contains the error is reversed and an erro appears at the bottom of the screen.

Chapter 5. Work with Source Overlays79

Page 99
Image 99
IBM AS/400 manual ValueReturnof tothesource overlaypromptlistin, Authorization-list-name

AS/400 specifications

The IBM AS/400, now known as the IBM iSeries, is a midrange computer system that has been a cornerstone of enterprise computing since its introduction in 1988. Designed to provide a robust platform for business applications, the AS/400 is celebrated for its reliability, scalability, and integrated database capabilities.

One of the key features of the AS/400 is its Integrated Operating Environment, which blends hardware and software resources seamlessly. This integration allows businesses to execute diverse workloads, ranging from traditional applications to modern web-based services, all on a single platform. The operating system, OS/400 (now IBM i), offers a rich set of APIs and tools for developers, simplifying application development and management.

Another standout characteristic of the AS/400 is its built-in database, DB2 for i. This powerful relational database management system allows for efficient data handling and provides advanced features such as support for SQL, XML, and JSON, making it easier for businesses to manage their data and integrate it with other systems. The database's tight integration with the operating system enables high performance and security.

In terms of scalability, the AS/400 can accommodate small businesses as well as large enterprises, with the ability to support hundreds of users simultaneously. Its architecture allows for easy upgrades in hardware, meaning that organizations can scale their systems without replacing the entire infrastructure.

Security is another critical attribute of the AS/400. With a sophisticated security model, it offers built-in user authentication, access control, encryption, and auditing capabilities to protect data and applications from unauthorized access.

The AS/400 also supports multiple programming languages, including RPG, COBOL, Java, and PHP, giving organizations the flexibility to choose the development tools that best fit their needs. This diversity helps maintain legacy applications while also developing new ones that leverage modern technologies.

Moreover, the platform supports both traditional green-screen interfaces and modern graphical user interfaces, allowing organizations to transition smoothly into contemporary user experience paradigms.

Overall, the IBM AS/400 stands out as a resilient, flexible, and secure computing platform that enables organizations to effectively manage their business operations, streamline processes, and adapt to changing market demands. Its unique combination of integrated features and capabilities ensures that it remains relevant in today's fast-paced technology landscape.