Problem solve Get help with specific problems with your technologies, process and projects.

Authorization lists for security purposes

Does using authorization lists for security purposes have a negative impact on the performance of the AS/400? Is there a recommended use of authorization lists as to not impact the performance of the AS/400?

To my knowledge, there are no documented, or undocumented impacts on the performance of an AS/400, or any individual piece of software based on authorization list security.

Dig Deeper on Past Releases

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.