News Stay informed about the latest enterprise technology news and product updates.

WRKOBJ

WRKOBJ

Tom Buck, a data security analyst at Rite Aid in Camp Hill, Pa., says his favorite command is WRKOBJ. It's the command he uses most often and the one that's the most useful. He says that with its ability to use generics, even if you are not sure how an object name is spelled, you can still find it. Other reasons why he likes it:

  • The ability to use generics can display a "series" of objects with similar names and across multiple libraries.
  • Using Library parm as *ALL you can find multiple occurrences of objects with the same name.
  • Objects can be found by type, by name or both.
  • Once object(s) are listed, you can display the description, display the authority, edit the authority, copy, rename, etc.
  • Some of the options can be prompted, allowing output to *PRINT or *OUTFILE.

Here are a few other ways WRKOBJ can be used:

  • Are my objects really secure?
    When reviewing the security of his objects, through WRKOBJ display authority, one user said he sees that the objects are not secured by an authorization list and PUBLIC has full access. His security guy, however, says the objects are secured from the authorization lists. What's really going on? Carol Woodbury responds.
  • Complete cleanup for your iSeries system
    Search400.com member Darpan Saini makes use of WRKOBJ in this tip that helps you determine your ASP utilization percentage.
  • Logical files in different library than physical files
    Search400.com member Don Tully uses WRKOBJ when he wants to list logical files where the logicals are in a different library than their associated physical file.

>> Return to list of commands.

Dig Deeper on iSeries programming commands

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

Close