CRTBNDRPG Command

cific authority to the object. The authority can be altered for specified users after the program is created with the CL commands Object Authority (GRTOBJAUT) or Revoke Object Authority (RVKOBJAUT). further information on these commands,CL Rseferencethe (Abridged)

*LIBCRTAUT

 

 

 

 

 

 

 

 

 

 

 

 

The

public

authority for the object is taken

from

the

CRTAUT

ke

the

target

library (the library that contains

the

object). The

mined when the object is created. If the CRTAUT

value

for

the

changes

after

the create,

the new value will

not

affect

any

e

*ALL

 

 

 

 

 

 

 

 

 

 

 

 

Authority for

all operations on the program object,

except

those

the

owner

or

controlled

by

authorization

list management authority.

user can control the program object's existence, specify

 

this

se

change

it,

and

perform

basic functions on

it,

but

cannot

transfer

ship.

 

 

 

 

 

 

 

 

 

 

 

*CHANGE

Provides all data authority and the authority to perform all ope program object except those limited to the owner or controlled b authority and object management authority. The user can change t and perform basic functions on it.

*USE

Provides

object operational authority

and read authority; that is

for basic operations on the program

object. The user is prevent

changing

the object.

 

*EXCLUDE

The user is prevented from accessing the object.

authorization-list

name

 

 

 

 

 

 

Enter

the

name of an authorization list of users and authorities

program is

added. The program

object will be

secured

by

this

list,

and

the

public authority

for

the

program

object

will

be s

The authorization list must exist on

the

system

when the CRTBNDRPG

command

is

issued.

 

 

 

 

 

 

Note: Use the AUT parameter to reflect the security requiremen system. The security facilities available are described in theSecurity - Referencemanual.

TRUNCNBR

Specifies if the truncated value is moved to the result field or ated when numeric overflow occurs while running the program.

Note: The TRUNCNBR option does not apply to calculations performed wit expressions. (Expressions are found in the Extended-Factor 2 fi overflow occurs for these calculations, an error will always oc addition, overflow is always signalled for any operation where that is assigned to an integer or unsigned field is out of r

*YES

Ignore numeric overflow and move the truncated value to the resu

416 ILE RPG for AS/400 Programmer's Guide

Page 440
Image 440
IBM AS/400 manual Change, Use, Exclude, Issued, Truncnbr

AS/400 specifications

The IBM AS/400, now known as the IBM iSeries, is a midrange computer system that has been a cornerstone of enterprise computing since its introduction in 1988. Designed to provide a robust platform for business applications, the AS/400 is celebrated for its reliability, scalability, and integrated database capabilities.

One of the key features of the AS/400 is its Integrated Operating Environment, which blends hardware and software resources seamlessly. This integration allows businesses to execute diverse workloads, ranging from traditional applications to modern web-based services, all on a single platform. The operating system, OS/400 (now IBM i), offers a rich set of APIs and tools for developers, simplifying application development and management.

Another standout characteristic of the AS/400 is its built-in database, DB2 for i. This powerful relational database management system allows for efficient data handling and provides advanced features such as support for SQL, XML, and JSON, making it easier for businesses to manage their data and integrate it with other systems. The database's tight integration with the operating system enables high performance and security.

In terms of scalability, the AS/400 can accommodate small businesses as well as large enterprises, with the ability to support hundreds of users simultaneously. Its architecture allows for easy upgrades in hardware, meaning that organizations can scale their systems without replacing the entire infrastructure.

Security is another critical attribute of the AS/400. With a sophisticated security model, it offers built-in user authentication, access control, encryption, and auditing capabilities to protect data and applications from unauthorized access.

The AS/400 also supports multiple programming languages, including RPG, COBOL, Java, and PHP, giving organizations the flexibility to choose the development tools that best fit their needs. This diversity helps maintain legacy applications while also developing new ones that leverage modern technologies.

Moreover, the platform supports both traditional green-screen interfaces and modern graphical user interfaces, allowing organizations to transition smoothly into contemporary user experience paradigms.

Overall, the IBM AS/400 stands out as a resilient, flexible, and secure computing platform that enables organizations to effectively manage their business operations, streamline processes, and adapt to changing market demands. Its unique combination of integrated features and capabilities ensures that it remains relevant in today's fast-paced technology landscape.