Location Rules

A Location rule can be used to control access to the IBM i servers capable of accepting remote transactions. (Network Security includes one default location rule for each server). Location rules can be used to define actions for access to a server, or for access to a specific function of a server (e.g. DELETEFILE).

All default location rules include the same parameters and are set with the same default values. See Parameters and Default Values.

All functions related to adding, editing, and deleting rules are available using either the web browser interface or the green screen, although the procedures for accomplishing these tasks differ considerably. While the green screen interface offers many different screens that display the existing location rules in different formats, the browser interface offers a single screen (the Rules screen), with robust search and filtering capabilities that allow all rules (user and location) to be accessed immediately, for multiple systems, and with the ability to copy rules between systems. See Using the Web Browser Interface for details.

Location Icon

On the Rules screen, location rules can be identified by the icon next to the user profile or group name.

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
7.15 | 201709140431