Setting Firewall Rules for Programs

You can specify which users can run specific programs through the Work with Native AS/400 Program Security screen.

To filter activity by programs that it would run, select 5. Programs from the Native Object Security screen, as shown in Setting Firewall Rules for Native Objects (STRFW > 4).

The Work with Native AS/400 Program Security screen appears:

                   ​  Work with Native AS⁄400 Program Security​                     
                                                                               ​
 
Type options, press Enter. ​
                                                     
 ​
 1=Select    3=Copy    4=Delete​           ​  Subset . . . . . . .​         
                                                                               ​
 
Opt​
 Program     Library   ​   ​  ---------------------- Users ---------------------​  
     *ALL      ​    *ALL      ​   ​  DB        ​              ​              ​              ​       
     IBITKNR   ​    QTEMP     ​   ​  AU        ​              ​              ​              ​       
     PROC_FFD  ​    QTEMP     ​   ​  AU        ​              ​              ​              ​       
     PROC_US_CR​    QTEMP     ​   ​  AU        ​              ​              ​              ​       
     PROC_US_RD​    QTEMP     ​   ​  AU        ​              ​              ​              ​       
     PROC_US_RH​    QTEMP     ​   ​  AU        ​              ​              ​              ​       
     AUMSGPR   ​    SMZ4      ​   ​  ALEX      ​              ​              ​              ​       
     TABLEVIEW ​    TVADTAPD  ​   ​  %DEVELOP1 ​              ​              ​              ​       
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                                
                                                                  ​
       Bottom​  
 F3=Exit    F6=Add new    F8=Print    F12=Cancel                              ​   
                                                                                
                                                                                

Each line of the list contains the following fields:

Program

The name of the program. This can also be a generic name ending in an asterisk ("*") or *ALL, which refer to all the relevant programs in the library named in the next field for which more specific settings have not been created.

Library

The name of the library containing the programs. This can also be a special name beginning with an asterisk ("*") or *ALL, which refers to all the relevant programs in all the relevant libraries. For example, the program TEST1 in the Library *ALL refers to any program
TEST1 in any library.

Users

A list of up to four users or groups for which particular authorities have been set. If there are more than four, an ellipsis ("...") appears in a fifth column. Selecting the program by entering 1 in the Opt field displays a screen with the entire list of users.

To create settings for a new program, press the F6 key. The Add Native AS/400 Program Security screen appears, as shown in Adding Firewall Rules for Programs.

To print the information from this screen, press the F8 key.

To modify the settings for a program, enter 1 in the Opt field for the program. The Modify Native AS/400 Program Security screen appears, as shown in Modifying Firewall Rules for Programs.

To copy settings for one program to another, enter 3 in the Opt field for the program. The Copy Object Security screen appears, as shown in Copying Firewall Rules for Programs.

To delete the settings for a program, enter 4 in the Opt field for the program. The Delete Native AS/400 Program Security screen appears, as shown in Deleting Firewall Rules for Programs.