Authorization lists for security purposes

Does using authorization lists for security purposes have a negative impact on the performance of the AS/400? Is

there a recommended use of authorization lists as to not impact the performance of the AS/400?

To my knowledge, there are no documented, or undocumented impacts on the performance of an AS/400, or any individual piece of software based on authorization list security.

This was first published in May 2001

Dig deeper on Past Releases

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: