Setting up users thru IBM security is fairly simple. Where it gets complicated is what type of ERP system are you running, and if it has its own security or users IBM security.
From a command line wrkusrprf *all, press enter,, of course you have to have the correct security attributes, before you can issue this command.
If you do a WRKUSRPRF USRPRF(*ALL), and scroll down to a user who you want to "clone", you can use option 3=Copy to clone the profile. But you would have to know how to set that user up in whatever applications they need to be set up in. Every application has its own secuity, or lack thereof, and you need to know how that works before your new user can get started.
Feles mala! Cur cista non uteris? Stramentum novum in ea posui!
you need to look on the ihbm iseries web site,, or check the redbooks site for possible downloads.. Cannot help you if you are unmotivated to write something down.
You're not likely to find specific instructions which will show how each field needs to filled out for your specific environment. Sorry to say, but you'll probably have to write them yourself. How are we supposed to know if your users need *ALLOBJ, *SPLCTL, etc. authority?
Mark
There are 10 types of people in this world, those who understand binary and those who don't.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.