Manta alt


You must allow the browser to execute JavaScript programs if you want to view product information. If your browser is set up to execute JavaScript programs, the problem is that the product ID was incorrect. Use the menu bar above to find the desired product.



This course describes the security-related system values. These control the sign-on and password-change processes.

The course is divided into three interactive sessions. The course begins by reviewing the purpose of system values and the commands you can use to display or change the settings of system values. You can skip this session if you are already familiar with these tasks.

The second session covers those system values that control the sign-on process. You will see how to control the number of attempts the user will be given to sign on and the action the system should take in response to a sign-on failure. You will also see how to control the actions taken by the system when it detects that a workstation has been left unattended.

The third session discusses those system values that are password related. You will see how to force passwords to expire after a specified number of days and how to control the types of passwords that a user may enter.

Approximate Study Time: 90 minutes


After completing this course, you should be able to:

  • Change IBM i system values to control password selection and system access
  • Predict the result of a sign-on attempt or password change, given the current settings of the appropriate system values
  • Identify the two ways that password rules can be specified
  • Code the appropriate system values to reject passwords meeting specified criteria

Topic Outline

Changing System Values

System Values that Control the Sign-On Process

Password-Related System Values


The course is intended for security officers and other personnel who are responsible for designing and implementing a system security plan. The audience also includes system administrators, programmers, managers, and users who will participate in security planning for the system as a whole or for one or more applications.


This course assumes that you are familiar with the concepts and basic operations of IBM i systems. You can satisfy these prerequisites by successfully completing the courses in the following series:

The course also assumes that you have an understanding of IBM i security concepts. You can satisfy this prerequisite by successfully completing the first course of this series:

You may also have obtained these skills by taking other courses or through relevant work experience.