Table of Contents


  1. Preface
  2. Introduction to PowerExchange
  3. DBMOVER Configuration File
  4. Netport Jobs
  5. PowerExchange Message Logs and Destination Overrides
  6. SMF Statistics Logging and Reporting
  7. PowerExchange Security
  8. Secure Sockets Layer Support
  9. PowerExchange Alternative Network Security
  10. PowerExchange Nonrelational SQL
  11. PowerExchange Globalization
  12. Using the PowerExchange ODBC Drivers
  13. PowerExchange Datatypes and Conversion Matrix
  14. Appendix A: DTL__CAPXTIMESTAMP Time Stamps
  15. Appendix B: PowerExchange Glossary

Authorization to Run PowerExchange Listener Commands on i5/OS

Authorization to Run PowerExchange Listener Commands on

You can configure PowerExchange to authorize users to issue the PowerExchange Listener LISTTASK and STOPTASK commands through the iSeries SNDLSTCMD interface, the PowerExchange Navigator, and the DTLUTSK utility on i5/OS.
In the DBMOVER configuration file on the i5/OS system that is the target of PowerExchange Listener commands, set the first parameter in the SECURITY statement to 2. PowerExchange checks security objects in the PowerExchange data library to determine whether the user ID supplied on the LISTTASK or STOPTASK command is authorized to run LISTTASK and STOPTASK commands.
During the installation process, PowerExchange creates the security objects for the LISTTASK and STOPTASK commands with a default public authority of *EXCLUDE. To authorize a user to issue LISTTASK and STOPTASK commands, grant the user *USE authority to the security objects for the commands. For example, to authorize a user to issue a LISTTASK command to a PowerExchange Listener running on an i5/OS system, grant the user *USE access to the
/AUTHTSKLST security object on that system.
The following table lists the access authority that the PowerExchange Listener requires to run LISTTASK and STOPTASK commands:
PowerExchange Listener Command
Library and File Name
Authority Required


We’d like to hear from you!