Manage Learn to apply best practices and optimize your operations.

Securing command keys

How does one secure command keys, i.e. F9, etc.?

The <F9=Retrieve> function key that is available on many IBM command lines cannot easily be disabled. However, you can restrict what is available to the <F9=Retrieve> function itself by setting a message level of 0, 1 or 2 in the job's LOG() attribute. A message level of 0 or 1 will result in no commands being made available. A message level of 2 will allow a command to be available if it resulted in a high-level message with a severity code greater than or equal to the severity specified for Message Severity, i.e., an error occurred when the command ran. Message levels 3 and 4 will make all commands available.

The job's message level can be set through the LOG() parameter of the job description for the job or through the CHGJOB command LOG() parameter. You can easily see this in action by entering forms of the CHGJOB command LOG() parameter on a command entry display. Change LOG() from 0 to 1 to 2, etc., and issue a DSPJOB command between each of them while detailed messages are enabled.


The Best Web Links: tips, tutorials and more.

Search400's targeted search engine: Get relevant information on security.

Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.

Check out this Search400.com Featured Topic: Top ten security tips

Dig Deeper on iSeries system and application security

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.