System Management System Values: Ibm I 7.3
System Management System Values: Ibm I 7.3
7.3
System management
System values
IBM
Note
Before using this information and the product it supports, read the information in “Notices” on page
199.
This edition applies to version IBM i 7.2 (product number 5770-SS1) and to all subsequent releases and modifications
until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC)
models nor does it run on CISC models.
This document may contain references to Licensed Internal Code. Licensed Internal Code is Machine Code and is
licensed to you under the terms of the IBM License Agreement for Machine Code.
© Copyright International Business Machines Corporation 1998, 2015.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with
IBM Corp.
Contents
System values....................................................................................................... 1
PDF file for System values........................................................................................................................... 1
What's new for IBM i 7.3..............................................................................................................................2
System value categories.............................................................................................................................. 2
System values: Auditing overview......................................................................................................... 4
Auditing system values: Activate action auditing............................................................................ 5
Auditing system values: Do not audit objects in QTEMP............................................................... 12
Auditing system values: Activate object auditing.......................................................................... 13
Auditing system values: Audit journal error action........................................................................14
Auditing system values: Maximum journal entries before writing to auxiliary storage................ 16
Auditing system values: Default auditing for newly created objects............................................ 17
System values: Date and time overview.............................................................................................. 18
Date and time system values: System date................................................................................... 19
Date and time system values: Leap-year adjustment................................................................... 20
Date and time system values: Time of day.................................................................................... 21
Date and time system values: Offset from Coordinated Universal Time (UTC)............................ 22
Date and time system values: Time zone.......................................................................................22
Date and time system values: Time adjustment............................................................................24
System values: Devices overview........................................................................................................ 25
Devices system values: Local controllers and devices.................................................................. 25
Devices system values: Device naming convention.......................................................................26
Devices system values: Remote controllers and devices.............................................................. 27
Devices system values: Pass-through devices and Telnet............................................................ 28
Devices system values: Action to take when a device error occurs on the workstation.............. 29
System values: International overview............................................................................................... 30
International system values: Date and time.................................................................................. 32
International system values: Decimal format................................................................................33
International system values: Currency symbol............................................................................. 34
International system values: Language......................................................................................... 34
International system values: Country/Region............................................................................... 36
International system values: Default system keyboard................................................................ 37
International system values: Coded character set ID................................................................... 40
International system values: Graphic character set/Code page................................................... 41
International system values: Character identifier control.............................................................41
International system values: Sort sequence................................................................................. 42
International system values: Coded font name.............................................................................43
International system values: Coded font point size...................................................................... 44
International system values: Locale.............................................................................................. 45
International system values: Set job attributes based on locale.................................................. 46
International system values: Double-byte capable.......................................................................46
System values: Jobs overview............................................................................................................. 47
Jobs system values: Allow jobs to be interrupted to run user-defined exit programs................. 49
Jobs system values: Allocate storage at restart............................................................................ 50
Jobs system values: Allocate additional storage as needed......................................................... 51
Jobs system values: Maximum jobs...............................................................................................52
Jobs system values: Initial printer output block size.................................................................... 52
Jobs system values: Maximum printer output files....................................................................... 53
Jobs system values: Maximum job log size................................................................................... 54
Jobs system values: When maximum size is reached................................................................... 54
Jobs system values: Time-out interval for inactive jobs............................................................... 55
Jobs system values: When a job reaches time-out....................................................................... 56
iii
Jobs system values: Time-out interval for disconnected jobs...................................................... 57
Jobs system values: Produce printer output for job log................................................................ 58
Jobs system values: When a function in a multithreaded job is not threadsafe...........................60
Jobs system values: Detach printer output after jobs have ended............................................... 60
Jobs system values: Maximum time for immediate end............................................................... 62
System values: Library lists overview.................................................................................................. 63
Library lists system values: System library list.............................................................................. 63
Library lists system values: User library list...................................................................................64
System values: Messages and service overview................................................................................. 64
Messages and service system values: History log file size............................................................66
Messages and service system values: Display status messages.................................................. 66
Messages and service system values: Message queue for lines, controllers, and devices.......... 67
Messages and service system values: Journal accounting information....................................... 68
Messages and service system values: Problem log filter.............................................................. 69
Messages and service system values: Minimum retention........................................................... 69
Messages and service system values: Log software problems detected by the system..............70
Messages and service system values: Service log for unmonitored escape messages............... 71
Messages and service system values: Allow remote service of system....................................... 72
System values: Password overview..................................................................................................... 72
Password system values: Password level...................................................................................... 74
Verifying passwords when changing password levels............................................................. 76
Password system values: Minimum password length................................................................... 77
Password system values: Maximum password length.................................................................. 78
Password system values: Require at least one digit......................................................................79
Password system values: Restrict consecutive digits................................................................... 79
Password system values: Restricted characters........................................................................... 80
Password system values: Restrict repeating characters............................................................... 81
Password system values: Require a new character in each position............................................ 82
Password system values: Password reuse cycle........................................................................... 83
Password system values: Password expiration............................................................................. 84
Password system values: Password expiration warning interval.................................................. 84
Password system values: Minimum time between password changes........................................ 85
Password system values: Password validation program...............................................................86
Password system values: Password rules......................................................................................87
System values: Performance overview................................................................................................92
Performance system values: Dynamically adjust job priorities of interactive jobs.......................94
Performance system values: Dynamically adjust job priorities within priority bands.................. 95
Performance system values: Automatically adjust memory pools and activity levels................. 97
Performance system values: Maximum eligible threads............................................................... 97
Performance system values: Machine memory pool size..............................................................98
Performance system values: Base memory pool minimum size...................................................99
Performance system values: Base memory pool maximum eligible threads............................... 99
Performance system values: Move interactive jobs to base pool at end of time slice............... 100
Performance system values: Communications configuration recovery......................................101
Performance system values: Communications arbiter jobs at restart........................................102
Performance system values: Available display station pass-through server jobs..................... 103
Performance system values: Parallel processing for queries and indexes.................................104
Performance system values: Database query time limit.............................................................105
Performance system values: Lock libraries in a user job's library search list.............................105
Performance system values: Allow background database statistics collection......................... 106
Performance system values: Automatically adjust thread resources.........................................107
Performance system values: Thread affinity............................................................................... 108
System values: Power control overview............................................................................................ 109
Power control system values: When power failure occurs..........................................................110
Power control system values: Message queue and library......................................................... 111
System values: Printing overview...................................................................................................... 112
Printing system values: Default printer........................................................................................113
Printing system values: Format when using Print key................................................................. 113
iv
Printing system values: Printed page footer................................................................................ 114
System values: Restart overview.......................................................................................................114
Restart system values: Type of restart.........................................................................................116
Restart system values: Automatically restart after power failure...............................................116
Restart system values: Allow remote power-on and restart.......................................................117
Restart system values: Allow scheduled restart......................................................................... 118
Restart system values: Maximum time for immediate shutdown...............................................119
Restart system values: Startup program to set up system......................................................... 120
Restart system values: Controlling subsystem/library................................................................121
Restart system values: If console problem occurs......................................................................121
Restart system values: Wait for database recovery before completing restart..........................122
Restart system values: Previous system ending status...............................................................123
Restart system values: Previous restart type.............................................................................. 123
Restart system values: Previous restart - printers started..........................................................124
System values: Save and restore overview....................................................................................... 124
Save and restore system values: Convert objects during restore............................................... 125
Save and restore system values: Allow restore of security sensitive objects............................ 127
Save and restore system values: Verify object signatures during restore.................................. 128
Save and restore system values: Save access paths...................................................................130
System values: Security overview..................................................................................................... 131
Security system values: Security level.........................................................................................133
Security system values: Allow server security information to be retained.................................134
Security system values: Users who can cause programs to use adopted authority from
calling programs...................................................................................................................... 135
Security system values: Default authority for newly created objects in QSYS.LIB file system..136
Security system values: Allow use of shared or mapped memory with write capability........... 137
Security system values: Allow these objects in........................................................................... 137
Security system values: Use registered exit programs to scan the root (/), QOpenSys, and
user-defined file systems........................................................................................................138
Security system values: Scan control.......................................................................................... 139
Security system values: Secure Sockets Layer protocols........................................................... 141
Security system values: Secure Sockets Layer cipher control.................................................... 142
Security system values: Secure Sockets Layer cipher specification list..................................... 143
System values: Sign-on overview...................................................................................................... 146
Sign-on system values: Incorrect sign-on attempts................................................................... 147
Sign-on system values: When maximum is reached................................................................... 148
Sign-on system values: Display sign-on information.................................................................. 149
Sign-on system values: Maximum number of device sessions a user can have.........................150
Sign-on system values: Restrict privileged users to specific device sessions............................151
Sign-on system values: Remote sign-on......................................................................................151
System values: Storage overview...................................................................................................... 152
Storage system values: Automatically clean up unused printer output storage........................ 153
Storage system values: Maximum system disk pool usage........................................................ 154
Storage system values: When maximum usage is reached........................................................ 155
System values: System and user defaults overview......................................................................... 156
System and user defaults system values: Model number...........................................................157
System and user defaults system values: Serial number............................................................158
System and user defaults system values: Processor feature code.............................................159
System and user defaults system values: Console name........................................................... 159
System and user defaults system values: Assistance level........................................................ 160
System and user defaults system values: Attention program.....................................................160
System and user defaults system values: Default user environment......................................... 161
System and user defaults system values: Use type-ahead feature............................................ 162
System and user defaults system values: Processor multitasking............................................. 163
Network attributes............................................................................................................................. 163
Obsolete system values...........................................................................................................................167
Security system values: Server authentication interval....................................................................167
Character-based categories versus IBM Navigator for i categories.......................................................168
v
System value concepts............................................................................................................................168
Lock function of security-related system values...............................................................................169
Effects of system value settings on restore operations.................................................................... 171
System value parameters........................................................................................................................174
Managing system values..........................................................................................................................190
Comparing and updating system values............................................................................................190
Completing the security wizard......................................................................................................... 191
Locking and unlocking security-related system values.................................................................... 191
Preparing system values for a restore operation.............................................................................. 192
Planning system values for a restore operation.......................................................................... 192
Configuring system values for a restore operation...................................................................... 193
Running a restore command........................................................................................................ 194
Saving system values......................................................................................................................... 194
Securing system access levels...........................................................................................................195
Working with system values inventory.............................................................................................. 197
Notices..............................................................................................................199
Programming interface information........................................................................................................ 200
Trademarks.............................................................................................................................................. 200
Terms and conditions.............................................................................................................................. 201
vi
System values
System values are pieces of information that affect the system operating environment. System values are
not objects on the system. Rather, system values contain control information for the operation of certain
parts of the system.
You can use system values to change the system in order to define the working environment. For example,
system date, library list, international characteristics, and certain security features are all set by system
values.
You can manage system values using IBM® Navigator for i or the character-based interface. The image you
see shows the location of the system values function in IBM Navigator for i. Follow the highlighted path
to access system values. After you select System Values, you can select one of the categories of system
values.
To change system values, you need *USE authority to the Change System Values (CHGSYSVAL) command.
In addition, some system values require a special authority. If special authorities are needed, they are
noted in the system value topics that follow.
Using IBM Navigator for i, you can manage system values with a Web browser. You can work with the
system values function of IBM Navigator for i. You can also use the time management function to work
with the Time zone (QTIMZON) and Time adjustment (QTIMADJ) system values.
Related concepts
Time management
Related tasks
Comparing and updating system values
You can use IBM Navigator for i to compare and update your system values across multiple systems in
your network.
Related information
IBM Navigator for i
These system value categories are different from the categories used in the character-based interface.
Related concepts
Character-based categories versus IBM Navigator for i categories
System value categories in IBM Navigator for i are different from the categories in the character-based
interface. In the character-based interface, system values are grouped into categories by the Type (TYPE)
parameter. However, the type parameters do not correspond directly to the categories in IBM Navigator
for i.
Obsolete system values
These system values are no longer used by the operating system.
Lock function of security-related system values
Most security system values can be altered only by a user with Security administrator (*SECADM) and
All object (*ALLOBJ) special authorities. To prevent even these users from changing these system values
during normal operation, system service tools (SST) and dedicated service tools (DST) provide an option
to lock these security values.
Effects of system value settings on restore operations
When you prepare for a restore operation, you need to set the restore system values so that they are
compatible during a restore operation.
Securing system access levels
System values 3
You can control the level of security by setting the password system values.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Do not audit objects in QTEMP Use this system value to exclude QAUDCTL
objects in the QTEMP library
when object-level or user-level
auditing is activated.
Activate object auditing Use this system value to have the QAUDCTL
system write a record to the audit
journal each time an object being
audited is accessed by a user.
Audit journal error action Use this system value to specify QAUDENDACN
the action for the system to
take when audit records cannot
be sent to the auditing journal
because of errors that occur
when the journal entry is sent.
Maximum journal entries before Use this system value to set the QAUDFRCLVL
writing to auxiliary storage number of journal entries written
to the auditing journal before
the journal entry data moves to
auxiliary storage.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Auditing
and click Properties, then switch to the System
tab.
Special authority Audit (*AUDIT).
Notes:
1. To view this system value, you must have
Audit (*AUDIT) or All object (*ALLOBJ) special
authority.
If you do not have the required authority,
the Auditing category is not displayed in IBM
Navigator for i. If you access this system
value in the character-based interface, the Not
available (*NOTAVL) value is displayed.
2. To change this system value, you must have
Audit (*AUDIT) special authority.
System values 5
What can I do with this system value?
In the character-based interface, you can specify *AUDLVL for the QAUDCTL system value. By specifying
*AUDLVL, you can use any of the auditing actions in the QAUDLVL system value. In addition, you can
specify *AUDLVL2 for the QAUDLVL system value. You can use this special parameter (*AUDLVL2) to
specify more auditing actions. If the QAUDLVL system value does not contain the value *AUDLVL2, the
system ignores the values in the QAUDLVL2 system value.
In IBM Navigator for i, you can select what actions to audit without differentiating between QAUDLVL2
and QAUDLVL. There is no limit on how many actions you can audit.
You can specify the following values for this system value:
Attention events (*ATNEVT)
Use this option to audit attention events. Attention events are conditions that require further
evaluation to determine the condition's security significance. Use this option to audit attention events
that occur on the system. This option is available only on systems running IBM i V5R4, or later.
Authorization failure (*AUTFAIL)
Use this option to audit unsuccessful attempts to sign on the system and to access objects. Use
authorization failures to regularly monitor users trying to perform unauthorized functions on the
system. You can also use authorization failures to assist with migration to a higher security level and
to test resource security for a new application.
Communication and networking tasks (*NETCMN)
Use this option to audit communications and networking tasks. This option is composed of the
Network base tasks (*NETBAS), Network cluster tasks (*NETCLU), Network failure (*NETFAIL), and
the Mail and DHCP functions from Network sockets tasks (*NETSCK).
Job base tasks (*JOBBAS)
Use this option to audit job base functions; for example, job start and stop data. This option is not
supported on systems running IBM i V5R4, or earlier.
Job tasks (*JOBDTA)
Use this option to audit actions that affect a job. Use job tasks to monitor who is running batch jobs.
The Job tasks option is composed of the Job base tasks (*JOBBAS) value and the Job (thread level)
profile changes (*JOBCHGUSR) value. If you specify both of these values, you get the same auditing as
if you specified the Job tasks option. This option is not supported on systems running IBM i V5R4, or
earlier.
Job (thread level) profile changes (*JOBCHGUSR)
Use this option to audit changes to a thread's active user profile or its group profiles.
Network base tasks (*NETBAS)
Use this option to audit network base tasks. This option audits transactions on your network of
systems. The following are some example network base tasks that are audited:
• Changes to IP rules. For example, if someone creates an IP rule that blocks traffic into or out of an
IP interface, that action is audited.
• Audit state changes of a VPN (Virtual Private Network) connection going up or down. If the
connection is up, the VPN connection is usable and communication between the two systems
is protected. If the connection is down, either the communication is not protected or no
communication is allowed at all.
• Communication between sockets from one system to another
• APPN directory search filter
• APPN end point filter
This option is available only on systems running IBM i V5R3, or later.
Network cluster tasks (*NETCLU)
Use this option to audit cluster or cluster resource group operations.
System values 7
Office tasks (*OFCSRV)
Use this option to audit the OfficeVision licensed program. This option audits changes to the system
distribution directory and the opening of a mail log. Actions performed on specific items in the mail log
are not recorded. Use office tasks to detect attempts to change how mail is routed or to monitor when
another user's mail log is opened.
Optical tasks (*OPTICAL)
Use this option to audit optical functions, such as adding or removing an optical cartridge or changing
the authorization list used to secure an optical volume. Other functions include copying, moving, or
renaming an optical file, saving or releasing a held optical file, and so on.
Printing functions (*PRTDTA)
Use this option to audit the printing of a spooled file, printing directly from a program, or sending a
spooled file to a remote printer. Use printing functions to detect printing confidential information.
Program adoption (*PGMADP)
Use this option to audit the use of adopted authority to gain access to an object. Use program
adoption to test where and how a new application uses adopted authority.
Program temporary fix (PTF) object changes (*PTFOBJ)
Use this option to audit changes to PTF objects. The following are some examples:
• Library objects such as *PGM and *SRVPGM objects
• Replaceable Unit (RU) objects for LIC PTFs
• Integrated File System (IFS) objects
Program temporary fix (PTF) operations (*PTFOPR)
Use this option to audit PTF operations. The following are some examples:
• Load, apply, or remove a PTF
• Log or delete a PTF save file
• Install PTFs using GO PTF or INSPTF command
Security configuration (*SECCFG)
Use this option to audit security configuration. The following are some examples:
• Create, change, delete, and restore operations of user profiles
• Changing programs (CHGPGM) to adopt the owner's profile
• Changing system values, environment variables, and network attributes
• Changing subsystem routing
• Resetting the security officer (QSECOFR) password to the shipped value from Dedicated Service
Tools (DST)
• Requesting the password for the service tools security officer user ID to be defaulted
• Changing the auditing attribute of an object
This option is available only on systems running IBM i V5R3, or later.
Security directory services (*SECDIRSRV)
Use this option to audit changes or updates when doing directory service functions. The directory
service function allows users to store files and objects. The following are some actions performed
using the directory service function that are audited:
• Changing audit levels
• Changing authorities
• Changing passwords
• Changing ownerships
• Binding and unbinding successfully
This option is available only on systems running IBM i V5R3, or later.
System values 9
Security socket descriptors (*SECSCKD)
Use this option to audit the passing of socket or file descriptors between IBM i jobs. The descriptor is
a 4-byte integer that points to an entry in a process descriptor table. This table is a list of all socket
and file descriptors that have been opened by this process. Each entry in this table represents a single
socket or file that this process has opened. The following are some examples:
• Giving a socket or file descriptor to another job
• Receiving a socket or file descriptor from another job
• Inability to receive a socket or file descriptor that was passed to this job. For example, the job that
called the receive message command (recvmsg()) did not have enough authority or was not running
the same user profile as the job that had originally called the send message command (sendmsg())
when the descriptor was passed.
This option is available only on systems running IBM i V5R3, or later.
Security tasks (*SECURITY)
Use this option to audit events related to security, such as changing a user profile or system value. Use
security tasks to detect attempts to circumvent security by changing authority, auditing, or ownership
of objects, by changing programs to adopt their owner's authority, or by resetting the security officer's
password.
By selecting this option, you are also selecting to audit the following:
• Security configuration
• Directory service functions
• Security interprocess communications
• Network authentication service actions
• Security run time functions
• Security socket descriptors
• Verification functions
• Validation list objects
Security validation tasks (*SECVLDL)
Use this option to audit validation list objects. A validation list object is used to store data. The data
is encrypted for security reasons. For example, you may have a validation list that stores user names
and passwords that are used to control access to a Web page. A validation list is used rather than
a database file because the validation list is more secure because it only contains user names and
passwords rather than user profiles. The following are some example tasks that are audited when this
option is selected:
• Adding, changing, or removing a validation list entry
• Accessing a validation list entry
• Successful and unsuccessful verification of a validation list entry
This option is available only on systems running IBM i V5R3, or later.
Security verification (*SECVFY)
Use this option to audit verification functions. The following are some examples:
• Changing a target user profile during a pass-through session
• Generating a profile handle
• Invalidating a profile token
• Generating the maximum number of profile tokens
• Generating a profile token
• Removing all profile tokens for a user
• Removing user profile tokens for a user
• Authenticating a user profile
System values 11
The Do not audit objects in QTEMP system value is also known as QAUDCTL (*NOQTEMP). You can use
this system value to exclude objects in the QTEMP library when you activate object-level or user-level
auditing.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, selectConfiguration
and Service. Right-click on Auditing and click
Properties, then switch to the System tab.
Special authority Audit (*AUDIT).
Notes:
1. To view this system value, you must have
Audit (*AUDIT) or All object (*ALLOBJ) special
authority.
If you do not have the required authority,
the Auditing category is not displayed in IBM
Navigator for i. If you access this system
value in the character-based interface, the Not
available (*NOTAVL) value is displayed.
2. To change this system value, you must have
Audit (*AUDIT) special authority.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Auditing
and click Properties, then switch to the System
tab.
Special authority Audit (*AUDIT).
Notes:
1. To view this system value, you must have
Audit (*AUDIT) or All object (*ALLOBJ) special
authority.
If you do not have the required authority,
the Auditing category is not displayed in IBM
Navigator for i. If you access this system
value in the character-based interface, the Not
available (*NOTAVL) value is displayed.
2. To change this system value, you must have
Audit (*AUDIT) special authority.
System values 13
Quick reference
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Auditing
and click Properties, then switch to the Journaling
tab.
System values 15
Auditing system values: Maximum journal entries before writing to auxiliary
storage
The Maximum journal entries before writing to auxiliary storage system value is also known as
QAUDFRCLVL. You can use this system value to set the number of journal entries written to the security
auditing journal before the journal entry data moves to auxiliary storage.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Auditing
and click Properties, then switch to the Journaling
tab.
Special authority Audit (*AUDIT).
Notes:
1. To view this system value, you must have
Audit (*AUDIT) or All object (*ALLOBJ) special
authority.
If you do not have the required authority,
the Auditing category is not displayed in IBM
Navigator for i. If you access this system
value in the character-based interface, the Not
available (*NOTAVL) value is displayed.
2. To change this system value, you must have
Audit (*AUDIT) special authority.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Auditing
and click Properties, then switch to the New
Objects tab.
Special authority Audit (*AUDIT).
Notes:
1. To view this system value, you must have
Audit (*AUDIT) or All object (*ALLOBJ) special
authority.
If you do not have the required authority,
the Auditing category is not displayed in IBM
Navigator for i. If you access this system
value in the character-based interface, the Not
available (*NOTAVL) value is displayed.
2. To change this system value, you must have
Audit (*AUDIT) special authority.
System values 17
None (*NONE)
No auditing entries are sent for the object when it is used or changed.
User settings (*USRPRF)
Auditing entries are sent for the object when it is used or changed by a user who is currently being
audited. If the user who uses or changes this object is not being audited, no auditing entries are sent.
Changes to objects (*CHANGE)
Auditing entries are sent for the object when it is changed.
All access of objects (*ALL)
Auditing entries are sent for the object when it is used or changed.
Not available (*NOTAVL)
This value is displayed if the user does not have authority to view the auditing value. You cannot set
the system value to Not available (*NOTAVL). This value is only displayed when a user accessing the
system value does not have either All object (*ALLOBJ) or Audit (*AUDIT) special authority.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Time of day This system value specifies the QDATETIME, QTIME, QHOUR,
time of the day. QMINUTE, QSECOND
Related concepts
Time management
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Date and
Time and click Properties, then switch to the Date
tab.
Special authority All object (*ALLOBJ).
Default value No default value.
Changes take effect Immediately.
Lockable No.
Special considerations The system date is automatically updated when
the time reaches midnight, 12:00:00 a.m..
The QDAYOFWEEK system value cannot be set by
the user.
System values 19
Related concepts
Date and time system values: Time of day
The Time of day system value is also known as QDATETIME, QTIME, QHOUR, QMINUTE, and QSECOND.
You can use this system value to set the time on your system.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Date and
Time and click Properties, then switch to the Date
tab.
Special authority None.
Default value Use Gregorian leap-year adjustment.
Changes take effect Immediately.
Lockable No.
Special considerations The Leap-year adjustment system value is read-
only. The system manages this system value. You
cannot edit this system value.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Date and
Time and click Properties, then switch to the Time
tab.
Special authority All object (*ALLOBJ).
Default value No default value.
Changes take effect Immediately.
Lockable No.
System values 21
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Time adjustment
Date and time system values: Offset from Coordinated Universal Time (UTC)
The Offset from Coordinated Universal Time (UTC) system value is also known as QUTCOFFSET. You can
use this system value to specify the difference in hours and minutes between UTC and the current system
time.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Date and
Time and click Properties, then switch to the Time
tab.
Special authority None.
Default value +00:00.
Changes take effect Immediately.
Lockable No.
System values 23
Date and time system values: Time adjustment
The Time adjustment system value is also known as QTIMADJ. You can use this system value to identify
the software to use as the time maintenance application that synchronizes your system time with an
external time source.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > Time Management. Right-click on Time
Adjustment and click Open.
Special authority None.
Default value No adjustment software is specified.
Changes take effect Immediately.
Lockable No.
Pass-through devices and Telnet This system value sets automatic QAUTOVRT
configuration for pass-through
devices and Telnet.
Action to take when a device This system value sets the action QDEVRCYACN
error occurs on the workstation to take when a device error
occurs.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Devices
and click Properties, then select the Automatic
Configuration tab.
Special authority None.
Default value Selected. Allow local controllers and devices to be
automatically configured.
System values 25
Quick reference
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Devices
and click Properties, then select the Automatic
Configuration tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Use IBM i naming.
Changes take effect The next time a device is configured. Existing
configured device names are not changed.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Devices
and click Properties, then select the Automatic
Configuration tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Selected. Allow remote controllers and devices to
be automatically configured.
Changes take effect Immediately.
Lockable Yes.
System values 27
Devices system values: Pass-through devices and Telnet
The Pass-through devices and Telnet system value is also known as QAUTOVRT. You can use this system
value to set automatic configuration for pass-through devices and Telnet.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Devices
and click Properties, then select the Automatic
Configuration tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Deselected. Do not allow pass-through devices to
be automatically configured.
Changes take effect Immediately.
Lockable Yes.
Devices system values: Action to take when a device error occurs on the
workstation
The Action to take when a device error occurs on the workstation system value is also known as
QDEVRCYACN. You can use this system value to set the action to take when a device error occurs.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Devices
and click Properties, then select the Recovery tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Disconnect job, and send message to user's
application after reconnecting.
Changes take effect Immediately.
Lockable Yes.
System values 29
End the job and send message to QHST log (*ENDJOBNOLIST)
Ends the job. A message is sent to the QHST log indicating that the job ended because of the device
error. To minimize the performance impact of the ending job, the job's priority is lowered by 10, the
time slice is set to 100 milliseconds and the purge attribute is set to yes.
Select Produce a job log (*ENDJOB), if you want the message sent to the job log and the QHST log.
Related concepts
Jobs system values: Time-out interval for disconnected jobs
The Time-out interval for disconnected jobs system value is also known as QDSCJOBITV. You can use this
system value to specify how long a job can be disconnected before the job is ended.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Graphic character set/Code page This system value sets graphic QCHRID
character set and code page for
the system.
Character identifier control This system value sets the type QCHRIDCTL
of CCSID conversion that occurs
for display files, printer files, and
panel groups.
Coded font point size This system value specifies the QIGCFNTSIZ
coded font point size used on the
system.
Set job attributes based on locale This system value sets specific QSETJOBATR
job attributes based on locale.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
System values 31
International system values: Date and time
The Date and time system value is also known as QDATFMT, QDATSEP, and QTIMSEP. You can use these
system values to set the format to use when the system displays the date and to specify the symbol used
to separate the date and time.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Formats tab.
Special authority None.
Default value Varies for different countries or regions.
Changes take effect Immediately for new jobs that enter the system
after the change. This does not include jobs that
are active at the time of the change.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Formats tab.
Special authority None.
Default value Varies for different countries/regions.
Changes take effect Immediately for new jobs that enter the system
after the change. This does not include jobs that
are active at the time of the change.
Lockable No.
System values 33
International system values: Currency symbol
The Currency symbol system value is also known as QCURSYM. You can use this system value to specify
the symbol used for currency.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Formats tab.
Special authority None.
Default value Varies for different countries/regions.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Language/Characters tab.
Special authority None.
Default value Varies for different countries/regions.
Changes take effect Immediately, but they do not affect jobs that are
already started.
Lockable No.
Afrikaans (AFR)
Albanian (SQI)
Arabic (ARA)
Belgian Dutch (NLB)
Belgian French (FRB)
Belgium English (ENB)
Brazilian Portuguese (PTB)
Bulgarian (BGR)
Byelorussian (BEL)
Canadian French (FRC)
Catalan (CAT)
Croatian (HRV)
Czech (CSY)
Danish (DAN)
Dutch (NLD)
English Australian (ENA)
English Upper Case (ENP)
Estonian (EST)
Farsi (FAR)
Finnish (FIN)
French (FRA)
German (DEU)
Greek (ELL)
Hebrew (HEB)
Hungarian (HUN)
Icelandic (ISL)
Irish Gaelic (GAE)
Italian (ITA)
Japanese Katakana (JPN)
Korean (KOR)
Lao (LAO)
Latvian (LVA)
Lithuanian (LTU)
Macedonian (MKD)
Norwegian - Bokmal (NOR)
Norwegian - Nynorsk (NON)
Polish (PLK)
Portuguese (PTG)
Rhaeto-Romanic (RMS)
Romanian (ROM)
Russian (RUS)
Serbian (SRB)
Serbian Cyrillic (SRB)
Serbian Latin (SRL)
Simplified Chinese (CHS)
Slovakian (SKY)
Slovenian (SLO)
Spanish (ESP)
Swedish (SVE)
Swiss French (FRS)
Swiss German (DES)
Swiss Italian (ITS)
System values 35
Thai (THA)
Traditional Chinese (CHT)
Turkish (TRK)
UK English (ENG)
US English (ENU)
Ukrainian (UKR)
Urdu (URD)
Vietnamese (VIE)
Related concepts
International system values: Double-byte capable
The Double-byte capable system value is also known as QIGC. You can use this system value to
determine whether the double-byte character set (DBCS) version of the system is installed.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Language/Characters tab.
Special authority None.
Default value Varies for different countries or regions.
Changes take effect Immediately, but does not affect jobs already
started.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Language/Characters tab.
Special authority None.
Default value Varies for different countries or regions.
Changes take effect Immediately.
Lockable No.
Albania (ALI)
Albania Euro Currency (ALM)
Arabic X (CLB)
Arabic X Euro Currency CLE)
Austria/Germany (AGB)
Austria/Germany Euro Currency (AGE)
Austria/Germany Multinational (AGI)
Austria/Germany Multinational Euro Currency (AGM)
Bulgaria (BGB)
Bulgaria Euro Currency (BGE)
Belgium Multinational (BLI)
Belgium Multinational Euro Currency (BLM)
Brazilian Portuguese (BRB)
Brazilian Portuguese Euro Currency (BRE)
Canadian French (CAB)
Canadian French Euro Currency (CAE)
Canadian French Multinational (CAI)
Canadian French Multinational Euro Currency (CAM)
Croatia, Serbia (Latin), and Slovenia (YGI)
Croatia, Serbia (Latin), and Slovenia Euro Currency (YGM)
Czech Republic (CSB)
Czech Republic Euro Currency (CSE)
Cyrillic (CYB)
Denmark (DMB)
Denmark Euro Currency (DME)
Denmark Multinational (DMI)
Denmark Multinational Euro Currency (DMM)
Estonia (ESB)
France (Azerty) (FAB)
France (Azerty) Euro Currency (FAE)
France (Azerty) Multinational (FAI)
France (Azerty) Multinational Euro Currency (FAM)
Finland/Sweden (FNB)
System values 37
Finland/Sweden Euro Currency (FNE)
Finland/Sweden Multinational (FNI)
Finland/Sweden Multinational Euro Currency (FNM)
France (Qwerty) (FQB)
France (Qwerty) Multinational (FQI)
FYR (Former Yugoslav Republic of Macedonia) (MKB)
FYR (Former Yugoslav Republic of Macedonia) Euro Currency (MKE)
Greece (GKB)
Greece (GNB)
Greece Euro Currency (GNE)
Hebrew (NCB)
Hebrew Euro Currency (NCE)
Hindi (HIB) Hungary (HNB)
Hungary Euro Currency (HNE)
Iceland ICB)
Iceland Euro Currency (ICE)
Iceland Multinational (ICI)
Iceland Multinational Euro Currency (ICM)
India (Urdu) (PKB)
India (Urdu) Euro Currency (PKE)
International (INB)
International Multinational (INI)
Iran (Farsi) (IRB)
Italy (ITB)
Italy Euro Currency (ITE)
Italy Multinational (ITI)
Italy Multinational Euro Currency (ITM)
Japan (English) (JEB)
Japan English Multinational (JEI)
Japan (Kanji) and Katakana (JKB)
Japan Latin Extended (JPB)
Japan Latin Extended Euro Currency (JPE)
Japan Kanji and United States English (JUB)
Japan (Katakana)(KAB)
Korea (KOB)
Lao People's Democratic Republic (LAB)
Lao People's Democratic Republic Euro Currency (LAE)
Lithuania (LTB)
Latin 2 (ROB)
Latin 2 Euro Currency (ROE)
Latvia (LVB)
Netherlands (NEB)
Netherlands Euro Currency (NEE)
Netherlands Multinational (NEI)
Netherlands Multinational Euro Currency (NEM)
Norway (NWB)
Norway Euro Currency (NWE)
Norway Multinational (NWI)
Norway Multinational Euro Currency (NWM)
Polish (PLB)
Polish Euro Currency (PLE)
Portugal (PRB)
Portugal Euro Currency (PRE)
Portugal Multinational (PRI)
Portugal Multinational Euro Currency (PRM)
Romania (RMB)
Romania Euro Currency (RME)
Russia (RUB)
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
System values 39
International system values: Coded character set ID
The Coded character set ID system value is also known as QCCSID. You can use this system value to
specify the default coded character set ID.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Language/Characters tab.
Special authority None.
Default value Varies for different countries/regions.
Changes take effect Immediately, but they do not affect jobs that are
already started.
Lockable No.
On a double-byte character set (DBCS) system, this system value must be set to a mixed CCSID (a CCSID
that represents both single-byte and double-byte character set and code page). On a non-DBCS system,
this system value must be set to a single-byte character set (SBCS) CCSID. In IBM Navigator for i, the
International category of system values specifies whether DBCS is installed on the system. View the
Double-byte capable field on the DBCS page. The coded character set and the code page of the graphical
character set must always be compatible. If the coded character set is changed to a value that is not
compatible with the code page of the graphical character set (QCHRID), the graphical character set is
automatically changed.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Default system values for national language versions
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Language/Characters tab.
Special authority None.
Default value Varies for different countries or regions.
Changes take effect Immediately for display files, display device
descriptions, and printer files that are created,
changed, or overridden after the change.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Language/Characters tab.
Special authority None.
Default value Device description.
Changes take effect Immediately, but does not affect jobs that are
already started unless a change job request is
made.
Lockable No.
System values 41
What can I do with this system value?
You can specify the default type of CCSID conversion that occurs within a job for display files, printer
files, and panel groups. You must specify the Character identifier control special value on the character
identifier (CHRID) command parameter on the create, change, or override commands for display files,
printer files, and panel groups before this attribute is used. This system value can be referred to
for setting the character identifier control job attribute or the character identifier control user profile
attribute.
This system value has the following options:
Device description (*DEVD)
No conversion will occur.
Job (*JOBCCSID)
Coded character set ID (CCSID) conversion takes place if the device character identifier (CHRID) and
job character identifier (CCSID) are different and the job character identifier (CCSID) is not 65535.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Sort Sequence tab.
Special authority None.
Default value Use hexadecimal values of characters.
Changes take effect Immediately, but does not affect jobs already
started.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
DBCS tab.
Special authority None.
Default value Varies for different countries/regions.
Changes take effect Immediately.
Lockable No.
System values 43
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
DBCS tab.
Special authority None.
Default value Selected by the system.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Locale tab.
Special authority None.
Default value The default changed from *NONE to a default
locale based on the primary NLV installed.
Therefore, the default value varies for different
countries and regions. This change only affects
new systems, or those systems that have been
completely reinstalled.
Changes take effect Immediately, but does not affect jobs already
started.
Lockable No.
System values 45
International system values: Set job attributes based on locale
The Set job attributes based on locale system value is also known as QSETJOBATR. You can use this
system value to specify that certain job attributes are set to the value in a locale when the job is initiated.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
Locale tab.
Special authority None.
Default value Deselected. Do not set job attributes based on
locale.
Changes take effect Immediately, but they do not affect jobs that are
already started.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
International and click Properties, then select the
DBCS tab.
Special authority None.
Default value Yes, double-byte capability is installed.
Allocate additional storage as This system value specifies the QADLACTJ, QADLTOTJ
needed additional storage allocated for
active jobs and total jobs.
System values 47
Table 5. Jobs system values (continued)
Name in IBM Navigator for i Description of system value Name in character-based
interface
Allow jobs to be interrupted to This system value specifies how QALWJOBITP
run user-defined exit programs the system responds to user-
initiated requests to interrupt a
job to run a user-defined exit
program in that job.
Maximum time for immediate end This system value specifies the QENDJOBLMT
maximum amount of time for
application cleanup during the
immediate ending of a job.
Time-out interval for inactive jobs This system value specifies the QINACTITV
time-out interval for inactive jobs.
When job reaches time-out This system value specifies the QINACTMSGQ
action to take when an inactive
job reaches time-out.
When a maximum size is reached This system value specifies the QJOBMSGQFL
action to take when the maximum
job log size is reached.
Maximum job log size This system value specifies the QJOBMSGQMX
maximum job log size.
Initial printer output block size This system value controls the QJOBSPLA
initial size of a spooling control
block (SCB).
Produce printer output for job log This system value specifies how QLOGOUTPUT
the job log is produced when a
job completes.
Maximum printer output files This system value specifies the QMAXSPLF
maximum number of printer
output files allowed for a job.
Detach printer output after jobs This system value specifies QSPLFACN
have ended whether spooled files are kept
with a job or detached from the
job.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Other tab.
Special authority *ALLOBJ and *SECADM.
Default value Deselected.
Changes take effect Immediately, but does not affect jobs already
started.
Lockable Yes.
System values 49
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Call Job Interrupt Program (QWCJBITP) API
Change Job Interrupt Status (QWCCJITP) API
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select theAllocation tab.
Special authority None.
Default value For active jobs: 200; for total jobs: 200.
Changes take effect At the next restart of the system.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select theAllocation tab.
Special authority None.
Default value For active jobs: 30; for total jobs: 30.
Changes take effect Immediately.
Lockable No.
System values 51
allocated. These jobs include jobs on job queues, active jobs, and completed jobs with pending job logs or
with output on output queues. Possible values are 1 through 32767.
A value between 10 and 50 is recommended for this system value. Setting this number close to 1 can
cause excessive interruptions when many additional jobs are needed. The number should not be set too
high because the time required to add additional storage should be minimized.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Allocation tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value 163520.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Printer Output
tab.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Printer Output
tab.
Special authority None.
Default value 9999.
Changes take effect Immediately.
Lockable No.
System values 53
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Job Log tab.
Special authority None.
Default value 16.
Changes take effect Immediately, but the change does not affect jobs
that are already started.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Job Log tab.
Special authority None.
Default value Do not wrap job log. End the job.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Interactive Jobs
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Do not time-out.
Changes take effect Immediately.
Lockable No.
System values 55
The Time-out interval for inactive jobs system value determines when to take action on an inactive job.
You specify the inactive job time-out interval in minutes. When this time limit expires, the system takes
action on inactive interactive jobs. Excluded are local jobs that are currently signed on to a remote
system. For example, a workstation is directly attached to System A, and System A has this system value
set on. If you use pass-through or Telnet to sign on to System B, the time-out value set on System A does
not affect this workstation.
This system value has the following options:
Do not time-out (*NONE)
The system does not check for inactive interactive jobs.
5-300 minutes (5-300)
The number of minutes a job can be inactive before action is taken.
Related concepts
Jobs system values: When a job reaches time-out
The When a job reaches time-out system value is also known as QINACTMSGQ. You can use this system
value to specify the action the system takes when a job reaches the specified time-out interval.
Jobs system values: Time-out interval for disconnected jobs
The Time-out interval for disconnected jobs system value is also known as QDSCJOBITV. You can use this
system value to specify how long a job can be disconnected before the job is ended.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Interactive Jobs
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value End job.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Interactive Jobs
tab.
Special authority None.
Default value 240.
Changes take effect Immediately.
System values 57
Quick reference
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Job Log tab.
Special authority *JOBCTL.
Default value Selected and produced by job.
Changes take effect Immediately, but does not affect jobs already
started.
Lockable No.
System values 59
Jobs system values: When a function in a multithreaded job is not threadsafe
The When a function in a multithreaded job is not threadsafe system value is also known as
QMLTTHDACN. You can use this system value to specify the action to take when a function that is not
threadsafe runs in a job with multiple threads.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Threads tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Perform the function that is not threadsafe and
send message to job log.
Changes take effect Immediately.
Lockable No.
Jobs system values: Detach printer output after jobs have ended
The Detach printer output after jobs have ended system value is also known as QSPLFACN. You can use
this system value to specify whether printer output is kept with a job or detached from the job.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Printer Output
tab.
System values 61
Jobs system values: Maximum time for immediate end
The Maximum time for immediate end system value is also known as QENDJOBLMT. You can use this
system value to specify the amount of time for application cleanup during the immediate ending of a job.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Jobs and
click Properties, then select the Cleanup tab.
Special authority None.
Default value 120.
Changes take effect Immediately.
Lockable No.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Library
Lists and click Properties, then select the System
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value QSYS, QSYS2, QHLPSYS, QUSRSYS.
Changes take effect At the start of the next job.
Lockable No.
System values 63
The QSYS library cannot be removed. The libraries must exist in the system disk pool or in a basic user
disk pool.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Library
Lists and click Properties, then select the User
tab.
Special authority None.
Default value QGPL, QTEMP.
Changes take effect At the start of the next job.
Lockable No.
History log file size This system value specifies the QHSTLOGSIZ
maximum records in a history log.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
System values 65
Messages and service system values: History log file size
The History log file size system value is also known as QHSTLOGSIZ. You can use this system value to
specify the maximum number of records in the history log.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Messages
and Service and click Properties, then select the
General tab.
Special authority None.
Default value *DAILY.
Changes take effect The next time a history log is created.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Messages
and Service and click Properties, then select the
General tab.
Special authority None.
Default value Selected. Status messages are displayed.
Changes take effect Immediately, but does not affect jobs that are
already started.
Messages and service system values: Message queue for lines, controllers,
and devices
The Message queue for lines, controllers, and devices system value is also known as QCFGMSGQ. You can
use this system value to specify the message queue that the system uses when sending messages for
lines, controllers, and devices.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Messages
and Service and click Properties, then select
theGeneral tab.
Special authority System configuration (*IOSYSCFG).
Default value Message queue - QSYSOPR; Library - QSYS.
Changes take effect When you vary on the line, controller, or device
description. Therefore, if you change this system
value after a line, controller, or device description
has been varied on, you must vary off, then vary on
the configuration object to use the new value.
Lockable No.
A message queue, QSYS/QCFGMSGQ, is provided by the system with the above characteristics.
The following line description types support this system value: Token Ring, Ethernet, DDI, X.25, Frame
Relay.
System values 67
The following controller description types support this system value: APPC, SNA Host, Async, Local
Workstation, Remote Workstation, Virtual Workstation.
The following device description types support this system value: APPC, Printer, and Cryptographic.
The shipped value is QSYS/QSYSOPR, which results in the communications messages being sent to the
system operator message queue.
The message queue must exist in the system disk pool (also known as auxiliary storage pool) or in a basic
user disk pool.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Messages
and Service and click Properties, then select
theGeneral tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Deselected. No accounting information sent to a
journal.
Changes take effect At the start of the next job.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Messages
and Service and click Properties, then select the
Problems tab.
Special authority None.
Default value Do not filter.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Messages
and Service and click Properties, then select the
Problems tab.
Special authority None.
Default value 30 days.
Changes take effect Immediately.
Lockable No.
System values 69
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Messages and service system values: Log software problems detected by the
system
The Log software problems detected by the system system value is also known as QSFWERRLOG. You can
use this system value to specify whether to log software problems that are detected by the system.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Messages
and Service and click Properties, then select the
Problems tab.
Special authority None.
Default value Selected. Software problems detected by the
system are logged.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Messages
and Service and click Properties, then select the
Problems tab.
Special authority None.
Default value Selected. Include user jobs.
Changes take effect Immediately.
Lockable No.
System values 71
Messages and service system values: Allow remote service of system
The Allow remote service of system system value is also known as QRMTSRVATR. You can use this system
value to specify remote problem analysis for the system.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Messages
and Service and click Properties, then select the
Remote tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Deselected. Remote service of the system is not
allowed.
Changes take effect Immediately.
Lockable Yes.
Minimum time between password This system value sets the QPWDCHGBLK
changes time period that changes to a
password are blocked after the
last successful password change
operation.
Require a new character in each This system value requires that QPWDPOSDIF
position for each position in a new
password, users should use a
different character from the one
in the same position in the
previous password.
Require at least one digit This system value requires that QPWDRQDDGT
passwords use at least one digit.
System values 73
Related concepts
Securing system access levels
You can control the level of security by setting the password system values.
Related tasks
Verifying passwords when changing password levels
Before changing the Password level (QPWDLVL) system value, verify that your user profiles contain
passwords for the level you want to change to.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select the General tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Short passwords using a limited character set (0).
Changes take effect At the next restart of the system.
Lockable Yes.
System values 75
• Other systems in a network that are running with a password level of 0 or 1 or running on an
operating system earlier than OS/400 V5R1M0.
• Any other system that limits the length of passwords from 1-10 characters.
• PCs that are using Client Access V5R1, or earlier.
Long passwords using an unlimited character set. Disable IBM i NetServer on Windows 95/98/ME
clients. (3)
This level supports user profile passwords from 1-128 characters. Uppercase and lowercase
characters are allowed. Passwords can consist of any characters and the passwords are case
sensitive.
Before you change the password level to 3, see Password Level (QPWDLVL) and Planning password
level changes.
Moving from password level 3 back to 0 or 1 is not allowed without first changing to password level 2.
Password level 2 allows for creation of passwords that can be used at password level 0 or 1 as long as
the password meets the length and syntax rules for password level 0 or 1.
You cannot use this password level 3 if your system communicates with:
• Other systems in a network that are running with a password level of 0 or 1 or running on an
operating system earlier than OS/400 V5R1M0.
• Any other system that limits the length of passwords from 1-10 characters.
• The IBM i Support for Windows Network Neighborhood (IBM i NetServer) product.
• PCs that are using Client Access V5R1, or earlier.
The IBM i NetServer product works with Windows NT/2000/ XP/Vista clients when the password level
is 1 or 3. The IBM i NetServer product for Windows 95/98/ME cannot connect to a system where the
password level is set to 1 or 3. IBM i NetServer passwords are removed from the system at these
password levels because of security concerns with the weak encryption used for IBM i NetServer
passwords. The passwords are easy to decode.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select the Validation 1
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value 6.
Changes take effect Immediately.
System values 77
Quick reference
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select the Validation 1
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value 8.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select the Validation 1
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Deselected. Do not require a digit.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select the Validation 1
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Deselected. Consecutive digits are allowed.
System values 79
Quick reference
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select the Validation 1
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value No restricted characters.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select the Validation 1
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Characters may be used more than once.
Changes take effect Immediately.
Lockable Yes.
System values 81
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select the Validation 1
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Deselected. A new character in each position is not
required.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select the Validation 1
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value After 1 password.
Changes take effect Immediately.
Lockable Yes.
System values 83
Password system values: Password expiration
The Password expiration system value is also known as QPWDEXPITV. You can use this system value to
specify when a password expires.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select the Expiration
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Never expire.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select theExpiration
tab.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Click on Password and
click Properties, then select theGeneral tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value None.
Changes take effect Immediately.
Lockable Yes.
System values 85
Note: This system value is not valid on systems running IBM i V5R4, or earlier.
Quick reference
Location Character-based interface.
Special Authority All object (*ALLOBJ) and security administrator
(*SECADM).
Changes take effect The next time a password is changed.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Password
and click Properties, then select theValidation 2
tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Use the validation system values on the Validation
1 tab.
Changes take effect The next time a password is changed.
Lockable Yes.
System values 87
Table 9. Special values for the Password rules system value
Field in GUI Value in GUI or Description
in the character-
based interface
Password lengths: *MINLENnnn, This value specifies the minimum number of characters.
Minimum length where nnn is the
• If the Password level (QPWDLVL) system value is 0 or 1,
minimum length.
use the range of values from 1 to 10.
• If the Password level (QPWDLVL) system value is 2 or 3,
use the range of values from 1 to 128.
Notes:
1. The Minimum length value (*MINLENnnn) must be
less than or equal to the maximum length value
(*MAXLENnnn).
2. If no Minimum length value (*MINLENnnn) is specified,
a value of 1 (*MINLEN1) is assumed.
Password lengths: *MAXLENnnn, This value specifies the maximum number of characters.
Maximum length where nnn is the
• If the Password level (QPWDLVL) system value is 0 or 1,
maximum length.
use the range of values from 1 to 10.
• If the Password level (QPWDLVL) system value is 2 or 3,
use the range of values from 1 to 128.
Notes:
1. The Maximum length value (*MAXLENnnn) must be
greater than or equal to the Minimum length value
(*MINLENnnn).
2. If no Maximum length value (*MAXLENnnn) is specified,
a value of 10 (*MAXLEN10) is assumed for systems
operating with a Password level (QPWDLVL) value of 0
or 1, and 128 (*MAXLEN128) for systems operating with
a Password level (QPWDLVL) value of 2 or 3.
Restrict repeating • Characters can This value specifies whether a password can contain
characters be used more repeated character values.
than once. (No
value is set in
the character-
based interface.)
• *CHRLMTAJC.
Characters
cannot be used
consecutively.
• *CHRLMTREP.
Characters
cannot be used
more than once.
Letter characters: *LTRMAXn, where This value specifies the maximum number of letter
Maximum number n is the maximum characters that can occur in the password.
number of letter
The range of values is 0 to 9.
characters.
If you do not select this value, no value is set.
Notes:
1. If both the Minimum number value (*LTRMINn) and the
Maximum number value (*LTRMAXn) are specified, the
Maximum number value must be greater than or equal
to the Minimum number value.
2. If the Require a minimum number of lowercase and
uppercase letters value (*MIXCASEn) is specified, the
Maximum number value (*LTRMAXn) must be greater
than or equal to twice the *MIXCASEn value.
Letter characters: *LTRLMTAJC This value specifies whether consecutive letters can be
Restrict used in a password.
consecutive
letters
Digits: Minimum *DGTMINn, where This value specifies the minimum number of digits that
number n is the minimum must occur in the password.
number of digits.
Note: If specified, the Minimum number value (*DGTMINn)
must be less than or equal to the Maximum number value
(*DGTMAXn).
Digits: Maximum *DGTMAXn, where This value specifies the maximum number of digits that can
number n is the maximum occur in the password.
number of digits.
Note: The Maximum number value (*DGTMAXn) must
be greater than or equal to the Minimum number value
(*DGTMINn).
Digits: Restrict *DGTLMTAJC This value specifies whether consecutive digits can be used
consecutive digits in a password.
System values 89
Table 9. Special values for the Password rules system value (continued)
Field in GUI Value in GUI or Description
in the character-
based interface
Special *SPCCHRMINn, This value specifies the minimum number of special
characters: where n is characters that must occur in the password.
Minimum number the minimum
The range of values is 0 to 9.
number of special
characters. Note: If specified, the Minimum number value
(*SPCCHRMINn) must be less than or equal to the
Maximum number value (*SPCCHRMAXn).
First character: *LTRLMTFST This value specifies whether the first character of the
Restrict from password can be a letter.
being a letter
Notes:
1. You cannot specify this value if you have already
specified the Restrict from being a digit value
(*DGTLMTFST) and the Restrict from being a special
character value (*SPCCHRLMTFST).
2. For systems operating with a Password level (QPWDLVL)
value of 0 or 1, you cannot specify the Restrict from
being a letter value (*LTRLMTFST) and the Restrict
from being a special character value (*SPCCHRLMTFST)
concurrently.
Last character: *DGTLMTLST This value specifies whether the last character of the
Restrict from password can be a digit.
being a digit
Note: You cannot specify this value if you have
already specified the Restrict from being a letter value
(*LTRLMTLST) and the Restrict from being a special
character value (*SPCCHRLMTLST).
Last character: *LTRLMTLST This value specifies whether the last character of the
Restrict from password can be a letter.
being a letter
Note: You cannot specify this value if you have
already specified the Restrict from being a digit value
(*DGTLMTLST) and the Restrict from being a special
character value (*SPCCHRLMTLST).
Last character: *SPCCHRLMTLST This value specifies whether the last character of the
Restrict from password can be a special character.
being a special
Note: You cannot specify this value if you have
character
already specified the Restrict from being a digit value
(*DGTLMTLST) and the Restrict from being a letter value
(*LTRLMTLST).
Require a new *LMTSAMPOS This value specifies whether the same character can be
character in each used in a position corresponding to the same position in the
position from previous password.
previous password
Restrict user *LMTPRFNAME This value specifies whether the uppercase password value
profile in can contain the complete user profile name in consecutive
password positions.
Require a *MIXCASEn, This value specifies whether the password must contain at
minimum number where n is 0 to 9. least n uppercase and lowercase letters.
of lowercase and
Note: If the Letter characters maximum number value
uppercase letters
(*LTRMAXn) is specified, the Maximum number value
(*LTRMAXn) must be greater than or equal to twice the
*MIXCASEn value.
System values 91
Table 9. Special values for the Password rules system value (continued)
Field in GUI Value in GUI or Description
in the character-
based interface
Require *REQANY3 This value specifies whether to allow the password
characters from at to contain characters from the following four types of
least three of the characters: uppercase letters, lowercase letters, digits, and
following types special characters.
of characters:
Note: When the system is operating with a Password level
uppercase letters,
(QPWDLVL) value of 0 or 1, this value has the same effect
lowercase letters,
as specifying *DGTMIN1, *LTRMIN1, and *SPCCHRMIN1.
digits, and special
characters
Base memory pool minimum size This system value specifies the QBASPOOL
minimum base memory pool.
Dynamically adjust job priorities This system value sets the job QDYNPTYADJ
of interactive jobs priorities of interactive jobs
Dynamically adjust job priorities This system value sets the task QDYNPTYSCD
within priority bands scheduling policy.
Lock libraries in a user job's This system value prevents other QLIBLCKLVL
library search list jobs from deleting or renaming
the libraries in the search list.
Machine memory pool size This system value specifies the QMCHPOOL
size of the machine memory pool.
Database query time limit This system value sets the time QQRYTIMLMT
limit for a database query.
System values 93
Table 10. Performance system values (continued)
Name in IBM Navigator for i Description of system value Name in character-based
interface
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
General tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Selected. Dynamically adjust job priorities of
interactive jobs is turned on.
Changes take effect At the next restart of the system.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
General tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Selected. Dynamically adjust job priorities within
priority bands is turned on.
Changes take effect At the next restart of the system.
Lockable No.
System values 95
Priorities 0-9, which are always more favorable than the priorities in the dynamic range, are treated using
the static priority scheduling policy when the scheduler assigns the processor. Therefore, you must use
priorities 0-9 with caution.
Tasks of priorities 10-99 are dynamically scheduled.
When assigning the processor to a task, the scheduler refers to the task's cost. A task's cost is the task's
initial cost plus the cost that results from the task waiting for service. High priority tasks have high initial
cost while low priority tasks have low initial cost. Higher priority tasks accumulate cost faster than lower
priority tasks.
The scheduler assigns the processor to the task that has the highest cost when multiple tasks are ready
to run. Therefore, high priority tasks get better service than low priority tasks, and all tasks get service.
The dynamic priority scheduling policy reduces the risk of starvation because the lowest priority tasks get
service when their costs exceed those of high priority tasks.
The priorities of tasks in the dynamic range are not fixed. When a task uses more CPU or I/O than it should
use, if several tasks are waiting to be processed, the system might temporarily modify the task's priority,
making the task less favorable so that other tasks can use system resources.
Priorities 10-99 are grouped into bands. The difference in relative favorability between priorities of
the same band is much less significant than the difference in relative favorability between priorities of
different bands. Some bands might also have CPU and I/O limits defined. For example, on a particular
system, the priorities might be grouped into bands as follows:
When dynamic priority scheduling is in use, CPU and I/O limits are imposed on the transactions of jobs in
the dynamic priority range. When a job has exceeded its CPU or I/O limits, the system might temporarily
reduce the job's priority to favor jobs that have not exceeded their limits. When this occurs, the job's
priority is typically reduced enough to move to the next lower priority band until the job completes the
current transaction. When the transaction is completed, the job's priority is restored. For example, a job of
priority 17 might be temporarily reduced to priority 23.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Memory Pools tab.
Special authority None.
Default value At system restart and periodically after restart
selected.
Changes take effect Immediately. (However, if At system restart is
selected, you need to restart the system.)
Lockable No.
Special considerations If At System Restart is selected, no adjustments
are made until you restart the system.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Memory Pools tab.
Special authority None.
Default value No maximum.
Changes take effect Immediately.
Lockable No.
System values 97
What can I do with this system value?
You can specify the number of threads that can compete at the same time for memory and processor
resources. For all active subsystems, the sum of all threads running in all memory pools cannot exceed
the value you specify. If a thread cannot be processed because the activity level has been reached, the
thread waits until another thread reaches a time slice or a long wait.
This system value has the following values:
No maximum (*NOMAX)
This is the suggested setting.
1-32767
Specify the maximum number of eligible threads.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Memory Pools tab.
Special authority None.
Default value 20.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Memory Pools tab.
Special authority None.
Default value 5% of the main storage with a minimum value of
2000 KB.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Memory Pools tab.
Special authority None.
System values 99
Quick reference
Default value 6.
Changes take effect Immediately.
Lockable No.
Performance system values: Move interactive jobs to base pool at end of time
slice
The Move interactive jobs to base pool at end of time slice system value is also known as QTSEPOOL. You
can use this system value to specify whether to move interactive jobs to the base pool at the end of the
time slice.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Memory Pools tab.
Special authority None.
Default value Deselected. Do not move interactive jobs to base
pool at end of time slice.
Changes take effect When the next job is started. Active jobs are not
changed.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Communications tab.
Special authority None.
Default value Do not attempt to recover.
Changes take effect The next time a communications configuration
recovery object is varied on. A change to this
system value does not affect a communications
configuration object that is already varied on.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select
theCommunications tab.
Special authority Job control (*JOBCTL).
Default value System calculated.
Changes take effect At the next restart of the system.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Communications tab.
Special authority Job control (*JOBCTL).
Default value System calculated.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Database tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Do not allow parallel processing.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Database tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value No maximum.
Changes take effect Immediately.
Lockable No.
Performance system values: Lock libraries in a user job's library search list
The Lock libraries in a user job's library search list system value is also known as QLIBLCKLVL. You can
use this system value to prevent other jobs from deleting or renaming the libraries in the search list.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Library Lists tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Selected. Lock libraries in a user job's library
search list is allowed.
Changes take effect When the next job is started. Active jobs are not
changed.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Database tab.
Special authority None.
Default value Allow user-created and system-generated
database statistics.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Affinity tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Selected. Automatically adjust.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Performance and click Properties, then select the
Affinity tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Thread affinity: Secondary threads do not use
same processors and memory as initial thread.
Level of affinity: Threads use any resource.
Changes take effect Immediately, but not for jobs already started.
Lockable No.
Thread affinity
This value specifies whether secondary threads are grouped with the initial thread. Select one of the
following options:
Secondary threads use same processors and memory as initiating thread (*GROUP)
This option indicates that secondary threads have a preference for the same group of processors and
memory as the initial thread. Multithreaded workloads that share data between the threads within a
job might perform better when this option is used.
Secondary threads do not use same processors and memory as initiating thread (*NOGROUP)
This option indicates that secondary threads do not have a preference for the same group of
processors and memory as the initial thread. Workloads that use the full processing power of a system
might perform better when this option is used.
Level of affinity
This value specifies the degree to which the threads try to use the subset of system resources for which
they have a preference. Select one of the following options:
Threads only use resources they have affinity to (*HIGH)
Threads will only use the subset of system resources they have affinity to, and will wait until they
become available.
Threads use any resource (*NORMAL)
Threads will use any processor or memory in the system if the resources they have affinity to are not
readily available.
Related concepts
Performance system values: Automatically adjust thread resources
The Automatically adjust thread resources system value is also known as QTHDRSCADJ. You can use this
system value to specify whether the system dynamically makes adjustments to the affinity of threads that
are currently running on the system.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Message queue and library This system value specifies the QUPSMSGQ
message queue that receives
uninterruptible power supply
messages and the library where
the specified message queue is
found.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Power
Control and click Properties, then select the
General tab.
Special authority None.
Default value 200.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Power
Control and click Properties, then select the
General tab.
Special authority None.
Default value Message queue - QSYSOPR; Library - QSYS.
Changes take effect Immediately.
Lockable No.
Format when using Print key This system value specifies QPRTKEYFMT
whether border or header
information is included when the
Print key is pressed.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Printing
and click Properties, then select the General tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value PRT01.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Printing
and click Properties, then select the General tab.
Special authority None.
Default value Include header information.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Printing
and click Properties, then select the General tab.
Special authority None.
Default value Deselected. No text is printed at the bottom of
listings and separator pages.
Changes take effect Immediately.
Lockable No.
Wait for database recovery before This system value specifies QDBRCVYWT
completing restart whether to wait for database
recovery before completing the
restart.
Allow scheduled restart This system value sets the date QIPLDATTIM
and time for a scheduled restart.
Maximum time for immediate This system value specifies the QPWRDWNLMT
shutdown time limit before an immediate
shutdown occurs.
Startup program to set up system This system value specifies the QSTRUPPGM
program used to set up the
system.
Related reference
System value parameters
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select the General tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Unattended.
Changes take effect At the next restart of the system.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select the General tab.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select theGeneral tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select the General tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Deselected. Do not allow scheduled restart.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select the General tab.
Special authority None.
Default value 900 seconds.
Changes take effect Immediately.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select the Setup tab.
Special authority None.
Default value Library: QSYS; startup program: QSTRUP.
Changes take effect The next time the controlling subsystem is started.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select the Setup tab.
Special authority None.
Default value Controlling subsystem - QBASE; Library - QSYS.
Changes take effect At the next restart of the system.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select the Recovery tab.
Special authority None.
Default value Continue restart unattended.
Changes take effect At the next restart of the system.
Restart system values: Wait for database recovery before completing restart
The Wait for database recovery before completing restart system value is also known as QDBRCVYWT.
You can use this system value to specify whether to wait for database recovery before completing the
restart operation.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select the Recovery tab.
Special authority None.
Default value Deselected. Do not wait for database recovery
before completing restart.
Changes take effect At the next restart of the system.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select thePrevious tab.
Default value No default value.
Changes take effect This system value is read-only. You cannot change
this system value.
Lockable No.
Quick reference
Location: From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select the Previous tab.
Default value No default value.
Changes take effect: This system value is read-only. You cannot change
this system value.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Restart
and click Properties, then select the Previous tab.
Default value No default value.
Changes take effect This system value is read-only. You cannot change
this system value.
Lockable No.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on Save
and Restore and click Properties, then select the
Conversion tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Level 1.
Changes take effect Immediately.
Lockable Yes.
Save and restore system values: Allow restore of security sensitive objects
The Allow restore of security sensitive objects system value is also known as QALWOBJRST. You can
use this system value to specify the objects with security-sensitive attributes to be restored during the
installation of software fixes.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on Save
and Restore and click Properties, then select
theObjects tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value All objects selected.
Changes take effect At the start of the next restore operation.
Lockable Yes.
Save and restore system values: Verify object signatures during restore
The Verify object signatures during restore system value is also known as QVFYOBJRST. You can use this
system value to specify whether to restore objects without signatures or with signatures that are not valid.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on Save
and Restore and click Properties, then select the
Signatures tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Verify object signatures on restore; allow restore of
objects without signatures.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on Save
and Restore and click Properties, then select the
Access Paths tab.
Special authority None.
Default authority for newly This system value specifies the QCRTAUT
created objects in QSYS.LIB file default authority for objects that
system do not specify the authority.
Allow server security information This system value sets server QRETSVRSEC
to be retained security information to be
retained.
Secure Sockets Layer cipher This system value defines the QSSLCSL
specification list System SSL cipher specification
list.
Users who can cause programs This system value specifies which QUSEADPAUT
to use adopted authority from users can work with programs
calling programs with adopted authorities.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Security
and click Properties, then select the General tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Protect from undocumented system interfaces
(40).
Changes take effect At the next restart of the system.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Security
and click Properties, then select theGeneral tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Deselected. Server security information is not
retained.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Security
and click Properties, then select the General tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value All users.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration
and Service > System Values. Right-click on
Security and click Properties, then select the
Public Authority tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Change.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Security
and click Properties, then select the Shared
Memory tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Selected. Shared or mapped memory with write
capability is allowed.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. right-click on Security
and click Properties, then select theUser Domain
Objects tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Security system values: Use registered exit programs to scan the root (/),
QOpenSys, and user-defined file systems
The Use registered exit programs to scan the root (/), QOpenSys, and user-defined file systems system
value is also known as QSCANFS. You can use this system value to specify whether objects in the root (/),
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Security
and click Properties, then select the Scan tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Selected. Use registered exit programs to scan file
systems.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Security
and click Properties, then select the Scan tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Click on Security and
click Properties, then select the System TLS tab.
Special authority Input/output (I/O) system configuration
(*IOSYSCFG), all object (*ALLOBJ), and security
administrator (*SECADM).
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Click on Security and
click Properties, then select the System TLS tab.
Special authority Input/output (I/O) system configuration
(*IOSYSCFG), all object (*ALLOBJ), and security
administrator (*SECADM).
Default value Use system-defined.
Changes take effect Immediately for all subsequent System SSL/TLS
sessions.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Click on Security and
click Properties, then select the System TLS tab.
Special authority Input/output (I/O) system configuration
(*IOSYSCFG), all object (*ALLOBJ), and security
administrator (*SECADM).
Default value *AES_128_GCM_SHA256
*AES_256_GCM_SHA384
*CHACHA20_POLY1305_SHA256
*ECDHE_ECDSA_AES_128_GCM_SHA256
*ECDHE_ECDSA_AES_256_GCM_SHA384
*ECDHE_RSA_AES_128_GCM_SHA256
*ECDHE_RSA_AES_256_GCM_SHA384
*ECDHE_ECDSA_CHACHA20_POLY1305_SHA256
*ECDHE_RSA_CHACHA20_POLY1305_SHA256
*RSA_AES_128_GCM_SHA256
*RSA_AES_256_GCM_SHA384
*ECDHE_ECDSA_AES_128_CBC_SHA256
*ECDHE_ECDSA_AES_256_CBC_SHA384
*ECDHE_RSA_AES_128_CBC_SHA256
*ECDHE_RSA_AES_256_CBC_SHA384
*RSA_AES_128_CBC_SHA256
*RSA_AES_128_CBC_SHA
*RSA_AES_256_CBC_SHA256
*RSA_AES_256_CBC_SHA
*ECDHE_ECDSA_3DES_EDE_CBC_SHA
*ECDHE_RSA_3DES_EDE_CBC_SHA
*RSA_3DES_EDE_CBC_SHA
Incorrect sign-on attempts This system value sets how many QMAXSIGN
incorrect sign-on attempts a user
is allowed.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Signon
and click Properties, then select theGeneral tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value 3.
Changes take effect Immediately.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Signon
and click Properties, then select theGeneral tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Disable user and device.
Changes take effect Immediately.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Signon
and click Properties, then select theGeneral tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Deselected. Do not display sign-on information.
Changes take effect Immediately.
Lockable Yes.
Sign-on system values: Maximum number of device sessions a user can have
The Maximum number of device sessions a user can have system value is also known as QLMTDEVSSN.
You can use this system value to set the number of device sessions that a user can have concurrently.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Signon
and click Properties, then select theGeneral tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value No limit.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Signon
and click Properties, then select theGeneral tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Deselected. Users are not restricted to specific
device sessions.
Changes take effect Immediately.
Lockable Yes.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Signon
and click Properties, then select theRemote tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Always display sign-on.
Changes take effect Immediately.
When maximum usage is reached This system value specifies the QSTGLOWACN
action to take when the storage
pool has reached its maximum.
Maximum system disk pool usage This system value specifies the QSTGLOWLMT
maximum amount of storage
space that can be used.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Storage
and click Properties, then select theGeneral tab.
Special authority None.
Default value Selected. Automatically clean up unused printer
output storage with a retention period of 8 days.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Storage
and click Properties, then select theGeneral tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value 95%.
Changes take effect Immediately.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on Storage
and click Properties, then select theGeneral tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Send message to system operator and message
queue.
Changes take effect Immediately. However, if the available storage is
already at the maximum, the change will have no
effect until the storage has dropped below the
maximum and then reached the maximum again.
Lockable No.
Use type-ahead feature This system value sets the type- QKBDBUF
ahead function. You can also
select to use the Attention key
buffering option.
Default user environment This system value sets the default QSPCENV
user environment.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on System
and User Defaults and click Properties, then
select theSystem tab.
Default value Machine dependent.
Changes take effect This system value is read-only. You cannot change
this system value.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on System
and User Defaults and click Properties, then
select theSystem tab.
Default value Machine dependent.
Changes take effect This system value is read-only. You cannot change
this system value.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on System
and User Defaults and click Properties, then
select theSystem tab.
Default value Machine dependent.
Changes take effect This system value is read-only. You cannot change
this system value.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on System
and User Defaults and click Properties, then
select theSystem tab.
Default value QCONSOLE.
Changes take effect This system value is read-only. You cannot change
this system value.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on System
and User Defaults and click Properties, then
select theUser tab.
Special authority None.
Default value Basic.
Changes take effect The next time a user signs on to the system.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on System
and User Defaults and click Properties, then
select theUser tab.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on System
and User Defaults and click Properties, then
select theUser tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value IBM i.
Changes take effect The next time a user signs on to the system.
Lockable No.
Quick reference
Location From IBM Navigator for i, select Configuration and
Service > System Values. Right-click on System
and User Defaults and click Properties, then
select theUser tab.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value Selected. Use type-ahead feature.
Changes take effect The next time a user signs on to the system.
Lockable No.
Quick reference
Location Character-based interface.
Special authority All object (*ALLOBJ) and security administrator
(*SECADM).
Default value System controlled (2).
Changes take effect Immediately.
Lockable No.
Network attributes
You can use network attributes to control how your system communicates with other systems.
To access the network attributes from IBM Navigator for i, select Configuration and Services and then
select System Values, then right-click on the Network category and click Properties.
Local control point name The local control point name for LCLCPNAME
the system.
Default local location name The default local location name LCLLOCNAME
for the system.
Alert focal point to request The name of the system that is ALRRQSFP
requested to provide focal point
services.
Allow APPN virtual support Indicates whether the system will ALWVRTAPPN
allow APPN sessions and devices
to use virtual controllers.
Default ISDN connection list The name of the default ISDN DFTCNNLST
connection list. (This attribute is
no longer used).
Not Available1 Book and book shelf search path QBOOKPATH V5R1
Not Available1 Job message queue maximum initial size QJOBMSGQTL V5R1
Related concepts
System value categories
You can use IBM Navigator for i to work with the categories of system values.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
If you specify No for Allow security-related system values changes, users cannot change security-
related system values. If you need to change a security-related system value, the Allow security-related
system values changes parameter must be changed to Yes in SST.
In order for an object to be restored successfully, the object must pass the three system values that
work together during a restore operation: Verify object signatures during restore (QVFYOBJRST), Force
conversion on restore (QFRCCVNRST), and Allow restore of security-sensitive objects (QALWOBJRST).
However, if the Force object conversion (FRCOBJCVN) parameter and Force conversion on restore
(QFRCCVNRST) system value are not compatible, no conversion occurs and nothing is restored.
1
Abnormal.
*JOB
Journal job resource use.
*PRINT
Journal printer output.
QADLSPLA 2 Additional storage to Jobs DECIMAL (5 0) Not available Specify the additional storage to add to the spooling control block.
add to the spooling
control block
1
The system will allow jobs to be interrupted to run user-
defined exit programs. All new jobs becoming active will
default to be uninterruptible.
2
The system will allow jobs to be interrupted to run user-
defined exit programs. All new jobs becoming active will
default to be interruptible.
QALWOBJRST Allow restore of Save and restore CHAR 150 *ALL *ALL
security sensitive All objects are restored.
objects
*NONE
Do not allow objects with security-sensitive attributes to be
restored.
*ALWSYSSTT
System-state and inherit-state attribute objects are
restored.
*ALWPGMADP
Programs and service programs with the adopt attribute
are restored.
*ALWPTF
Allow system-state or inherit-state programs, service
programs, modules, objects that adopt authority, objects
that have the S_ISUID (set-user-ID) attribute enabled, and
objects that have the S_ISGID (set-group-ID) attribute
enabled to be restored to the system during a PTF
installation.
*ALWSETUID
Allow restore of files that have the S_ISUID (set-user-ID)
attribute enabled.
*ALWSETGID
Allow restore of files that have the S_ISGID (set-group-ID)
attribute enabled.
*ALWVLDERR
Allow objects with validation errors or suspected of having
been tampered with to be restored.
*DIR
Any SOM object in a directory in the integrated file system
can contain user domain objects. *DIR does not apply to
the QSYS and QDLS file systems. *DIR is mutually exclusive
with *ALL.
library-name
A list of library names that can contain user domain
objects.
*INTERMED
Intermediate level.
*ADVANCED
Advanced level.
*NONE
No attention program.
program-name
The specified program is used.
*OBJAUD
Objects are audited.
*AUDLVL
Actions are audited.
*NOQTEMP
QTEMP objects are not audited.
*NOTAVL
The user is not allowed to view the auditing system value.
*PWRDWNSYS
System ends with a system reference code (SRC).
*NOTAVL
The user is not allowed to view the auditing system value.
-1
The user is not allowed to view the auditing system value.
1-100
The number of security auditing journal entries.
*ATNEVT
Attention events.
*AUTFAIL
Authorization failures.
*CREATE
Object creations.
*DELETE
Deletions of external objects on the system are audited.
*JOBBAS
Job base functions are audited.
*JOBCHGUSR
Changing a thread’s active user profile or its group profiles
is audited.
*JOBDTA
Actions that affect a job.
*NETBAS
Network base functions.
*NETCLU
Cluster resource group.
*NETCMN
Networking and communications functions.
*NETFAIL
Network failures.
*NETSCK
Sockets tasks.
*NETSECURE
Secure network connections.
*NETTELSVR
Telnet Server connections.
*NETUDP
User Datagram Protocol traffic.
*NONE
No actions are audited.
*OBJMGT
Generic object tasks.
*OFCSRV
OfficeVision licensed program.
*OPTICAL
Optical functions are audited.
*PGMADP
Adopting authority from a program owner.
*PGMFAIL
Integrity violations (for example, blocked instruction,
validation value failure, and domain violation).
*PRTDTA
Printing functions.
*PTFOBJ
PTF object changes.
*PTFOPR
PTF operations.
*SAVRST
Save and restore information.
*SECCFG
Security configuration.
*SECDIRSRV
Directory service functions.
*SECIPC
Interprocess communications.
*SECNAS
Network authentication service actions.
*SECRUN
Security run time functions.
*SECSCKD
Socket descriptors.
*SECURITY
Security-related functions.
*SECVFY
Use of verification functions.
*SECVLDL
Validation list objects.
*SERVICE
Use of the system service tools.
*SPLFDTA
Spooled file.
*SYSMGT
System management functions.
*NOTAVL
The user is not allowed to view the auditing system value.
*ATNEVT
Attention events.
*CREATE
Object creations.
*DELETE
Deletions of external objects on the system are audited.
*JOBBAS
Job base functions are audited.
*JOBCHGUSR
Changing a thread’s active user profile or its group profiles
is audited.
*JOBDTA
Actions that affect a job.
*NETBAS
Network base functions.
*NETCLU
Cluster resource group.
*NETCMN
Networking and communications functions.
*NETFAIL
Network failures.
*NETSCK
Sockets tasks.
*NETSECURE
Secure network connections.
*NETTELSVR
Telnet Server connections.
*NETUDP
User Datagram Protocol traffic.
*NONE
No actions are audited.
*OBJMGT
Generic object tasks.
*OFCSRV
OfficeVision licensed program.
*OPTICAL
Optical functions are audited.
*PGMADP
Adopting authority from a program owner.
*PGMFAIL
Integrity violations (for example, blocked instruction,
validation value failure, and domain violation).
*PRTDTA
Printing functions.
*PTFOBJ
PTF object changes.
*PTFOPR
PTF operations.
*SAVRST
Save and restore information.
*SECCFG
Security configuration.
*SECDIRSRV
Directory service functions.
*SECIPC
Interprocess communications.
*SECNAS
Network authentication service actions.
*SECRUN
Security run time functions.
*SECSCKD
Socket descriptors.
*SECURITY
Security-related functions.
*SECVFY
Use of verification functions.
*SECVLDL
Validation list objects.
*SERVICE
Use of the system service tools.
*SPLFDTA
Spooled file.
*SYSMGT
System management functions.
*NOTAVL
The user is not allowed to view the auditing system value.
1
Automatic configuration is on.
1
Automatic configuration is on.
1
Reporting is on.
1-32500
The number of virtual devices to have automatically
configure.
*NOMAX
No maximum number of virtual devices. Equivalent to the
decimal value 32767.
*REGFAC
The program registered for the Virtual Device Selection
(QIBM_QPA_DEVSEL) exit point. Equivalent to the decimal
value -1.
QBASPOOL Base memory pool Performance DECIMAL (10 0) 2000 KB 256-2147483647 MB.
minimum size
QBOOKPATH 2 Book path System and user CHAR 315 '/QDLS/ QBKBOOKS/ BOOKS' directory-name
defaults
1
Years 2000-2062.
QCFGMSGQ Message queue for Messages and CHAR 20 QSYSOPR QSYS Message queue name and library name.
lines, controllers and service
devices
QCHRID Graphic character set/ International CHAR 20 Varies for different countries or regions. 1-32767 for the character set identifier and 1-32767 for the code
Code page page identifier.
*JOBCCSID
The *JOBCCSID special value performs the same function
as on the CHRID command parameter.
0-99
The number of communication arbiter jobs.
QCMNRCYLMT Communications Performance CHAR 20 00 The first 10 characters contain the count limit right-justified. The
configuration recovery last 10 characters contain the time interval right-justified.
QCNTRYID Country/Region International CHAR 2 Varies for different countries or regions. Country or region ID.
QCONSOLE Console name System and user CHAR 10 QCONSOLE QCONSOLE or specified name.
defaults
QCRTAUT Default authority for System and user CHAR 10 *CHANGE *CHANGE
newly created objects defaults Allows you to change the contents of an object.
in QSYS.LIB file system
*ALL
Allows you to read, change, delete, and manage the
security of an object.
*USE
Allows you to create an object, to display the contents of
an object, or to refer to the contents of an attached object
when a command being requested must access attached
objects and their contents.
*EXCLUDE
Allows no access to an object.
*USRPRF
Auditing depends on the user profile.
*CHANGE
Audits changes.
*ALL
Audits when used or changed.
*NOTAVL
The user is not allowed to view the auditing system value.
QCTLSBSD Controlling subsystem/ Restart CHAR 20 QBASE QSYS The first 10 characters contain the subsystem description name
library right-justified. The last 10 characters contain the library name
right-justified.
QCURSYM Currency symbol International CHAR 1 Varies for different countries or regions. Any character except blank, hyphen (-), ampersand (&), asterisk
(*), or zero (0).
QDATE1 Date Date and time CHAR 6 No default value. Depends on the date format being used.
QDATETIME1 Date and time Date and time CHAR 20 No default value. Specifies QDATE and QTIME.
QDATFMT 1 Date format Date and time CHAR 3 Varies for different countries or regions. This system value can be YMD, MDY, DMY, or JUL (Julian format),
where Y equals year, M equals month, and D equals day.
QDATSEP 1 Date separator Date and time CHAR 1 Varies for different countries or regions. Slash (/), dash (-), period (.), comma (,), or blank.
QDAYOFWEEK 1 Day of the week Date and time CHAR 4 No default value. *SUN
Sunday
*MON
Monday
*TUE
Tuesday
*WED
Wednesday
*THU
Thursday
*FRI
Friday
*SAT
Saturday
*SYSTEM
System requests.
*NONE
No requests.
QDECFMT1 Decimal format Date and time CHAR 1 Varies for different countries or regions. blank
Use a period for a decimal point, a comma for a 3-digit
grouping character, and zero-suppress to the left of the
decimal point.
J
Use a comma for a decimal point and a period for a 3-digit
grouping character. The zero-suppression character is in
the second position (rather than the first) to the left of the
decimal notation. Balances with zero values to the left of
the comma are written with one leading zero (0,04). The J
entry also overrides any edit codes that might suppress the
leading zero.
I
Use a comma for a decimal point, a period for a 3-digit
grouping character, and zero-suppress to the left of the
decimal point.
*S36
Naming conventions should follow System/36 standards.
*DEVADR
Device names are derived from the device address.
*DSCENDRQS
Disconnect the job. When the user signs on again, a cancel
request function is performed to return control of the job
back to the last request level.
*DSCMSG
Disconnect the job. When the user signs on again, an error
message is sent to the user's application.
*ENDJOB
End the job. A job log is produced for the job.
*ENDJOBNOLIST
End the job. A job log is not produced for the job.
*NONE
There is no disconnect interval.
1
Yes.
1
Objects with validation errors are converted.
2
Objects requiring conversion to be used on the current
version of the operating system or on the current machine
are converted. Objects with validation errors are also
converted.
3
Objects suspected of having been tampered with,
objects containing validation errors, and objects requiring
conversion to be used by the current version of the
operating system or on the current machine are converted.
4
Objects that contain sufficient creation data to be
converted and do not have valid digital signatures are
converted.
5
Objects that contain sufficient creation data are converted.
6
All objects that do not have valid digital signatures are
converted.
7
All objects are converted.
QHSTLOGSIZ History log file size Messages and DECIMAL (8, 0) *DAILY 1-10,000,000
service The number of records.
*DAILY
Specifies that a new version of the history log will be
created each time the date in the history log messages
changes, or when the current log version reaches the
maximum size of 10,000,000 records.
1
A DBCS version is installed.
QIGCCDEFNT Coded font name International CHAR 20 Varies for different countries or regions. First 10 characters contain the coded font name and the last
10 characters contain the library name.
*NONE - No coded font is identified to the system.
1-9999
The double-byte coded font point size in tenths. For
example, a value of 9999 in binary would be 999.9.
5-300
The number of minutes a job can be inactive before action
is taken.
*ENDJOB
Interactive job is ended.
CYYMMDDHHMMSS
C is the century, YY is the year, MM is the month, DD is
the day, HH is the hour, MM is the minute, and SS is the
second. A 0 for the century flag indicates years 19xx, and a
1 indicates years 20xx.
1
Automatic IPL after power restored.
2
Restart IPL.
3
Time-of-day IPL.
4
Remote IPL.
1
Attended with dedicated service tools.
2
Attended with console in debug mode.
*WRAP
Wrap to the beginning and start filling again.
*PRTWRAP
Wrap the message queue and print the messages that are
being overlaid because of the wrapping.
QJOBSPLA Initial printer output Jobs DECIMAL (5 0) 3516 3516 - 32767 bytes.
block size
*NO
Type-ahead and Attention key are off.
*YES
Type-ahead and Attention key are on.
QKBDTYPE Default system System and user CHAR 3 Varies for different countries or regions. Specifies the language character set for the keyboard.
keyboard defaults
QLANGID Language International CHAR 3 Varies for different countries or regions. Specifies the language identifier.
1-3
Adjustment in years.
1
Locked.
1
A user with *ALLOBJ or *SERVICE special authority can sign
on only to devices to which they have explicit authority.
QLOCALE Locale International CHAR 1024 Varies for different countries and regions. *NONE
No locale object is specified.
*C
A predefined locale object is to be used.
*POSIX
A predefined locale object is to be used.
Path name
Specified locale path name.
*JOBLOGSVR
The job log is produced by a job log server.
*PEND
The job log is not produced. The job log remains pending
until removed.
2-32767
The maximum number of eligible threads.
QMAXJOB Maximum jobs Jobs DECIMAL (10 0) 163520 32000 - 970000 jobs.
2
Disables the user profile.
3
Varies off the device and disables the user profile.
*NOMAX
No maximum number of sign-on attempts.
QMAXSPLF Maximum printer Jobs DECIMAL (10 0) 9999 9999 - 999999 files.
output files
QMCHPOOL Machine memory pool Performance DECIMAL (10 0) 20 Pool size in megabytes (MB).
size
2
Perform the function that is not threadsafe and send an
informational message.
3
Do not perform the function that is not threadsafe.
QMODEL Model number System and user CHAR 4 No default value. 4 character value that specifies the model number.
defaults
2
Performance adjustment at IPL and dynamically.
3
Dynamic performance adjustment.
QPRBFTR Problem log filter Messages and CHAR 20 *NONE Character list of up to two 10-character values in which the
service first value is the problem filter name and the second is the
library name.
*NONE - No problem filter is in use.
QPRCFEAT Processor feature code System and user CHAR 4 No default value. 4 character value in user-written programs.
defaults
1
Multitasking is on.
2
System controlled.
QPRTDEV Default printer Printing CHAR 10 PRT01 Specifies the default printer.
*PRTBDR
Border information is included.
*PRTHDR
Header information is included.
*PRTALL
Border and header information is included.
*NONE
No page footer text.
1-99
The number of hours users must wait after the last
successful password change operation before they can
change the password again.
1-366
The number of days before a password cannot be used.
1
Adjacent digits are not allowed.
QPWDLMTCHR Restricted characters Password CHAR 10 *NONE Specified characters are restricted.
*NONE - No characters are restricted.
1
Characters cannot be used more than once.
2
Characters can be used more than once but cannot be
repeated consecutively.
1
Passwords with 1-10 characters are supported and
NetServer passwords are removed.
2
Passwords with 1-128 characters are supported.
3
Passwords with 1-128 characters are supported and
NetServer passwords are removed.
1
The same characters cannot be used in a position
corresponding to the same position in the previous
password.
1
A numeric digit is required.
1
Different than previous 32 passwords.
2
Different than previous 24 passwords.
3
Different than previous 18 passwords.
4
Different than previous 12 passwords.
5
Different than previous 10 passwords.
6
Different than previous 8 passwords.
7
Different than previous 6 passwords.
8
Different than previous 4 passwords.
*ALLCRTCHG
Enforce password rules on CRTUSRPRF or CHGUSRPRF.
*CHRLMTAJC
Limit adjacent (same) characters.
*CHRLMTREP
Limit repeated (same) characters.
*DGTLMTAJC
Limit adjacent digits.
*DGTLMTFST
Limit first character from being a digit.
*DGTLMTLST
Limit last character from being a digit.
*DGTMAXn
Maximum number of digit characters (0 to 9).
*DGTMINn
Minimum number of digit characters (0 to 9).
*LMTSAMPOS
Limit the same character from being used in a position
corresponding to the same position in the previous
password.
*LMTPRFNAME
Limit profile name in password.
*LTRLMTAJC
Limit adjacent letters.
*LTRLMTFST
Limit first character from being a letter.
*LTRLMTLST
Limit last character from being a letter.
*LTRMAXn
Maximum number of letter characters (0 to 9).
*LTRMINn
Minimum number of letter characters (0 to 9).
*MAXLENnnn
Maximum number of characters (where nnn is 1 to 10 if
QPWDLVL is 0 or 1, 1 to 128 if QPWDLVL is 2 or 3).
*MINLENnnn
Minimum number of characters (where nnn is 1 to 10 if
QPWDLVL is 0 or 1, 1 to 128 if QPWDLVL is 2 or 3).
*MIXCASEn
Mixed case characters (0 to 9).
*REQANY3
Require characters from any of 4 types (uppercase,
lowercase, digits, and special characters).
*SPCCHRLMTAJC
Limit adjacent special characters.
*SPCCHRLMTFST
Limit first character from being a special character.
*SPCCHRLMTLST
Limit last character from being a special character.
*SPCCHRMAXn
Maximum number of special characters (0 to 9).
*SPCCHRMINn
Minimum number of special characters (0 to 9).
*REGFAC
The validation program name is retrieved from the
registration facility.
program-specification
The name of the validation program. This option is only
valid if the system is operating at QPWDLVL 0 or 1.
QPWRDWNLMT Maximum time for Restart DECIMAL (5 0) 900 seconds. 1-32767 seconds.
immediate shutdown
1
Automatic IPL is allowed.
*IO
Any number of tasks may be used when the database
query optimizer chooses to use I/O parallel processing for
queries.
*OPTIMIZE
The query optimizer can choose to use any number of tasks
for either I/O or SMP parallel processing to process the
query.
*MAX
The query optimizer can choose to use either I/O or SMP
parallel processing to process the query.
0-2147352578
Number of seconds.
1-366
The number of days empty spool database members are
kept for new spooled file use.
1
Remote power on and IPL are allowed.
*SAMEPRF
When the source and target user profile names are the
same, the sign-on may be bypassed for remote sign-on
attempts.
*VERIFY
After verifying that the user has access to the system, the
system allows the user to bypass the sign-on.
*REJECT
No remote sign-on is allowed.
1
Remote service attribute is on.
1
Save access paths.
*ERRFAIL
Fail operation if exit program errors are encountered.
*FSVRONLY
Only scan accesses through file servers.
*NOFAILCLO
Close requests are not failed if there is a scan failure.
*NOPOSTRST
Objects are scanned when changed, not just because they
are restored.
*NOWRTUPG
The system does not attempt to upgrade the access to
include write.
*USEOCOATR
Scanning depends on the object change only attribute.
1
Continue the IPL unattended.
20
The system requires a password to sign on.
30
The system requires a password to sign on, and users must
have authority to access objects and system resources.
40
The system requires a password to sign on, and users must
have authority to access objects and system resources.
50
The system requires a password to sign on, and users must
have authority to access objects and system resources.
Security and integrity of the QTEMP library and user
domain (*USRxxx) objects are enforced.
*CCSID
Coded character set identifier.
*DATFMT
Date format.
*DATSEP
Date separator.
*DECFMT
Decimal format.
*SRTSEQ
Sort sequence.
*TIMSEP
Time separator.
*NOLOG
No logging occurs.
*S36
System/36 environment is used.
*DETACH
Detach.
QSRLNBR Serial number System and user CHAR 8 No default value. 8 character serial number.
defaults
*LANGIDSHR
Table can contain the same weight for multiple characters.
*LANGIDUNQ
Table must contain a unique weight for each character.
*DMPUSRJOB
Service logs are created only for user jobs, not for system
jobs. System jobs include the system arbiter, subsystem
monitors, LU services process, spool readers and writers,
and the start-control-program-function (SCPF) job.
*NONE
Do not request logs for any jobs.
QSSLCSL Secure Sockets Layer Security CHAR 3840 See QSSLCSL for current default value.
cipher specification list *AES_128_GCM_SHA256
*AES_256_GCM_SHA384*CHACHA20_POLY1305_SHA256
*RSA_AES_128_GCM_SHA256
*RSA_AES_256_GCM_SHA384
*ECDHE_ECDSA_NULL_SHA
*ECDHE_ECDSA_RC4_128_SHA
*ECDHE_ECDSA_3DES_EDE_CBC_SHA
*ECDHE_RSA_NULL_SHA
*ECDHE_RSA_RC4_128_SHA
*ECDHE_RSA_3DES_EDE_CBC_SHA
*ECDHE_ECDSA_AES_128_CBC_SHA256
*ECDHE_ECDSA_AES_256_CBC_SHA384
*ECDHE_RSA_AES_128_CBC_SHA256
*ECDHE_RSA_AES_256_CBC_SHA384
*ECDHE_ECDSA_AES_128_GCM_SHA256
*ECDHE_ECDSA_AES_256_GCM_SHA384
*ECDHE_RSA_AES_128_GCM_SHA256
*ECDHE_RSA_AES_256_GCM_SHA384*ECDHE_ECDSA_CHACHA2
0_POLY1305_SHA256*ECDHE_RSA_CHACHA20_POLY1305_SHA
256
*RSA_AES_128_CBC_SHA256
*RSA_AES_128_CBC_SHA
*RSA_AES_256_CBC_SHA256
*RSA_AES_256_CBC_SHA
*RSA_3DES_EDE_CBC_SHA
*RSA_RC4_128_SHA
*RSA_RC4_128_MD5
*RSA_DES_CBC_SHA
*RSA_EXPORT_RC2_CBC_40_MD5
*RSA_EXPORT_RC4_40_MD5
*RSA_NULL_SHA256
*RSA_NULL_SHA
*RSA_NULL_MD5
*RSA_RC2_CBC_128_MD5
*RSA_3DES_EDE_CBC_MD5
*RSA_DES_CBC_MD5
*USRDFN
Use user-defined.
*TLSV1.3
Transport Layer Security version 1.3.
*TLSV1.2
Transport Layer Security version 1.2.
*TLSV1.1
Transport Layer Security version 1.1.
*TLSV1.0
Transport Layer Security version 1.0.
*SSLV3
Secure Sockets Layer version 3.0.
*SSLV2
Secure Sockets Layer version 2.0.
*CRITMSG
Message CPI099B is sent to the user who is specified
by the Critical messages to user service attribute. Service
attributes can be changed by using the Change Service
Attributes (CHGSRVA) command.
*REGFAC
A job is submitted to run any exit programs that are
registered for the QIBM_QWC_QSTGLOWACN exit point.
*ENDSYS
The system is ended and left in the restricted state.
*PWRDWNSYS
The system is powered down immediately and restarted.
1
Printer writers started.
program-name
The first 10 characters contain the program name, and the
last 10 characters contain the library name.
*NONE
Status messages are not displayed.
QSVRAUTITV2 Server authentication System and user DECIMAL (6 0) 2880 0-108000 minutes.
interval defaults
QSYSLIBL System library list Library lists CHAR 150 QSYS, QSYS2, QHLPSYS, QUSRSYS Up to 10 characters for each library name.
1
Thread resources are automatically adjusted.
*GROUP
Secondary threads are grouped.
*NORMAL
Threads can use any resources.
*HIGH
Threads only use resources it has affinity to.
identifier-name
The identifier of the time maintenance application.
QTIME System time Date and time CHAR 9 No default value. Specify the hour, minutes, and seconds.
QTIMSEP1 Time separator Date and time CHAR 1 Varies for different countries or regions. 1
Colon (:)
2
Period (.)
3
Comma (,)
4
Blank
QTIMZON Time zone Date and time CHAR 10 Varies for different countries or regions. time-zone-identifier
10 character identifier name.
*BASE
Jobs are moved to the base pool when time-slice end is
reached.
*CALC
The system assigns the appropriate wait time.
*NOMAX
Starts no action.
0
Automatically powers down the system.
1-99999
Powers down the system after the specified number of
seconds.
QUPSMSGQ Message queue and Power control CHAR 20 QSYSOPR QSYS Message queue name and library name.
library
QUSRLIBL User library list Library lists CHAR 250 QGPL QTEMP Up to 10 characters for each library name.
QUTCOFFSET Offset from UTC Date and time CHAR 5 +0000 Depends on the version and release of the system.
2
Verify signatures on restore. Restore unsigned commands
and user-state objects. Restore signed commands and
user-state objects, even if the signatures are not valid.
Restore inherit-state and system-state objects only if they
have valid signatures.
3
Verify signatures on restore. Restore unsigned commands
and user-state objects. Restore signed commands and
user-state objects only if the signatures are valid. Restore
inherit-state and system-state objects only if they have
valid signatures.
4
Verify signatures on restore. Do not restore unsigned
commands and user-state objects. Restore signed
commands and user-state objects, even if the signatures
are not valid. Restore inherit-state and system-state
objects only if they have valid signatures.
5
Verify signatures on restore. Do not restore unsigned
commands and user-state objects. Restore signed user-
state objects only if the signatures are valid. Restore
inherit-state and system-state objects only if they have
valid signatures.
Notes:
1
In IBM Navigator for i, this system value is grouped with other character-based system values. Therefore, the topic specific to this system value discusses all of the system values associated with it in IBM Navigator
for i. For example, the QTIME system value is called Time of day in IBM Navigator for i and it uses QTIME, QDATETIME, QHOUR, QMINUTE, and QSECOND.
2
The operating system no longer uses this system value.
3
In IBM Navigator for i, the Maximum system disk pool usage (QSTGLOWLMT) system value is the maximum percentage of used storage allowed. In the character-based interface, this system value specifies the disk
pool lower limit versus the maximum allowed.
Related concepts
Character-based categories versus IBM Navigator for i categories
System value categories in IBM Navigator for i are different from the categories in the character-based
interface. In the character-based interface, system values are grouped into categories by the Type (TYPE)
parameter. However, the type parameters do not correspond directly to the categories in IBM Navigator
for i.
Obsolete system values
These system values are no longer used by the operating system.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Retrieve System Values API
Password validation program None (See note “2” on page 196.) QPWDVLDPGM
By completing these steps, you have tightened sign-on access to the finance system by changing the
password system values. You can alter the values for each of the password system values to meet the
security level for your company. This example has provided one way that the password system values can
work together to produce a moderately strict environment.
Related concepts
System value categories
You can use IBM Navigator for i to work with the categories of system values.
System values: Password overview
You can use IBM i password system values to control the password values and password restrictions.
Related reference
System value parameters
You can set or view system values in IBM Navigator for i. However, if you want to code a program to set
or retrieve a system value, you need to use the character-based system value name and its associated
special parameters.
Related information
System value finder
For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property
Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other country where such
provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION
PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR
IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT,
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of
express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This information could include technical inaccuracies or typographical errors. Changes are periodically
made to the information herein; these changes will be incorporated in new editions of the publication.
IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for convenience only and do not in
any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of
the materials for this IBM product and use of those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it believes appropriate without
incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose of enabling: (i) the
exchange of information between independently created programs and other programs (including this
one) and (ii) the mutual use of the information which has been exchanged, should contact:
IBM Corporation
Software Interoperability Coordinator, Department YBWA
3605 Highway 52 N
Rochester, MN 55901
U.S.A.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business
Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be
trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at
"Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.
Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or
trademarks of Adobe Systems Incorporated in the United States, and/or other countries.
200 Notices
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the
United States, other countries, or both.
Java and all Java-based trademarks and logos are trademarks of Oracle, Inc. in the United States, other
countries, or both.
Other product and service names might be trademarks of IBM or other companies.
Notices 201
202 IBM i: System values
IBM®