• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • AAA Secures IBM i Server

    July 21, 2010 Pi Guang Ming

    The IBM HTTP Server for i, powered by Apache, has three distinct ways to handle whether a particular request for a resource will result in that resource actually being returned. These three techniques are access control, authentication, and authorization, or AAA.

    In this article, I’ll share how AAA works within IBM HTTP Server for i.

    First A: Access Control

    Access control refers to any means of controlling access to any resource. This A is distinct from authentication and authorization.

    IBM HTTP Server for i uses Allow and Deny directives to implement the criteria of access control. The Order directive

    …

    Read more
  • It’s My (De)fault That You’re a Zero

    July 21, 2010 Ted Holt

    Unless you say otherwise, numeric database fields have a value of zero and character fields are blank, right? Not necessarily. There’s more to default field values than some i Gurus realize.

    A field’s default value is the value the system assigns to the field when an application does not specify a value. Default values come into play in several situations.

    1. A record (row) is added to (inserted into) a physical file (table) by means of a logical file or SQL view that does not contain one or more fields.
    2. RPG O specs list the fields of an externally described file,
    …

    Read more
  • Admin Alert: The Poor Manager’s 5250 Single Sign-On

    July 21, 2010 Joe Hertvik

    Properly implemented, single sign-on (SSO) is a blessing for i/OS shops. With it, users log on to their desktops once and then access all their servers without entering several different passwords. But it’s always been problematic enabling SSO for Power i machines, causing some administrators to skip the process all together. This week, I’ll present a workaround for making PC5250 sessions act like single sign-on participants without configuring SSO.

    Same as Single Sign-On, Only Different

    In earlier articles, I outlined how to set up an i/OS system for single sign-on. (See Related Stories below.) A true SSO environment provides access

    …

    Read more

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18
  • Will The Turbulent Economy Downdraft IBM Systems Or Lift It?
  • How IBM Improved The Database With IBM i 7.6
  • Rocket Celebrates 35th Anniversary As Private Equity Owner Ponders Sale
  • 50 Acres And A Humanoid Robot With An AI Avatar
  • IBM i PTF Guide, Volume 27, Number 17

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle