|
> You can not pre-empt the system supplied sign-on programs, for the IBM > supplied attach points - you only get (mostly) the 'after the event' > by utilising the defined exit points. I guess I'm still not clear on when the exit programs actually get called, and what power they can exert once they are called. How 'after the event' are they? > However, if you have the time you can of course write your own FTP, > TELNET (TN5250E), etc. servers yourself. Not really what I'm looking to do. :) > The only one you will not be able to 'mirror' will be the standard > twinax terminal (and APPN) way of connecting; you can change the look > of sign-on screen, but not the underlying program that is called. >From what I can tell about APPN connections from a brief examination in the security implementation guide, I'm not worried so much about strong auth there. When I open up IBM Client Access on my PC, and do a regular old signon to an AS400 on my local network, what exit point is triggered (potentially)? /j
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.