Does using authorization lists for security purposes have a negative impact on the performance of the AS/400? Is there a recommended use of authorization lists as to not impact the performance of the AS/400?
To my knowledge, there are no documented, or undocumented impacts on the performance of an AS/400, or any individual piece of software based on authorization list security.
Dig deeper on Past Releases
Related Q&A from John Brandt
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.