Since V4R1, IBM has offered validation list objects, which allow you to identify and authenticate users of your Web applications. One of the benefits of validation lists is that they aren’t tied to AS/400 user profiles and passwords, so Web users don’t have access to publicly authorized objects on your system. Validation lists aren’t restricted to Web applications – any application can use them, and IBM provides several APIs for just that purpose.