Skip to content
  • Articles
  • About API – my my

Articles on Apis

APIs by Example

Written by Carsten FlensburgMay 10, 2007February 3, 2021

APIs by Example: Making the Connection with Server Authentication Entries

Exchanging and accessing data between systems is often a requirement in today’s application programming assignments. Different options are readily available on the System i to accomplish this task, provided that a TCP/IP connection is configured between the systems in question. DDM (Distributed Data Management) files, DDM data queues and DRDA (Distributed Relational Database Architecture) using SQL are some of the built-in facilities that come to mind.

Apart from setting up and configuring the connection between the systems, there’s yet another challenge included when going down that road: How do you authenticate the user profile under which the connection will be established? Again, different options exist, but one of the most secure and flexible is offered by server authentication entries.

A server authentication entry is added for a local user profile. It specifies a remote server as the main attribute and contains the authentication information (user ID and optionally, a password) that is sent to the remote server when the local user profile is used to establish a connection to the remote server. One user profile can have any number of server authentication entries, but only one per server.

The Work with Server Authentication Entries (WRKSVRAUTE) command will help you stay on top your server authentication entries.

Download the save file containing the source code.

Read the entire article

Share this:

  • Twitter
  • Facebook

Like this:

Like Loading...
Posted in Security, Systems management, User profile.

Leave a Reply Cancel reply

Fill in your details below or click an icon to log in:

Gravatar
WordPress.com Logo

You are commenting using your WordPress.com account. ( Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. ( Log Out /  Change )

Cancel

Connecting to %s

Archives

Category

API usage Application modernization Commands Cross reference Cryptographic services Database file Data queue Date and time Digital certificate manager Display file Document conversion DSM eBook Environment variables Exit points Hardware Help panel IFS Job Job accounting Job queue Job scheduler Job screen Journal LAN Locales Messages MI Module information NetServer Object Object authority Object locks Output queue PEX Printer Programs PTF Query Retrive journal entries RPG Save & restore Security SMTP Spooled files SQL Subsystem Systems management TCP/IP Tips Track exports Trigger UIM User profile User spaces Validation lists Watch definition Workload capping groups Work management XML ZIP

Blogroll

  • Scott Klement's site
  • Dan Riehl's site
  • Lillian Boutté
  • Anette Harboe Flensburg
  • Eamon O'Kane

Post navigation

Previous Post Additional Validation of New Passwords
Next Post Compliance Encryption: A System i Signature
Create a free website or blog at WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Articles on Apis
    • Already have a WordPress.com account? Log in now.
    • Articles on Apis
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
%d bloggers like this: