Have a Peek at Validation List Entries

I’ve discussed and demonstrated validation lists in a number of articles and utilities previously published in this newsletter. On these occasions, I’ve used validation lists to store sensitive session information as well as cryptographic encryption keys. Basically though, you can think of validation lists as password files, storing a user ID and an encrypted password, […]

APIs by Example: Validation List APIs

Since V4R1, IBM has offered validation list objects, which allow you to identify and authenticate users of your Web applications. One of the benefits of validation lists is that they aren’t tied to AS/400 user profiles and passwords, so Web users don’t have access to publicly authorized objects on your system. Validation lists aren’t restricted […]