Manta alt


You must allow the browser to execute JavaScript programs if you want to view product information. If your browser is set up to execute JavaScript programs, the problem is that the product ID was incorrect. Use the menu bar above to find the desired product.



This course describes user profiles, the key element in establishing a user environment. The course begins with five interactive sessions, each of which discusses a collection of user profile options:

  • Basic profile options
  • Security options
  • Group member options
  • Job, message, and output options
  • Environment options

You will see the purpose of each user profile field and the options available to you as the security administrator.

The course then describes the IBM i commands used to create and maintain user profiles. This part of the course begins with an introduction to the commands associated with user profiles and the authorities required to perform various user profile functions. You will then practice creating profiles in a simulated IBM i session. Next, you will practice displaying, changing, and deleting profiles. Finally, the course describes how to test a profile that you have created.

Approximate Study Time: 2.5 hours


After completing this course, you should be able to:

  • Predict the result of a sign-on attempt, given the current values of the appropriate fields in the user's profile
  • Identify the differences between a group profile and the profile for a group member
  • Identify the authority required to perform a given function on a user profile
  • Code the user profile parameter to satisfy a given requirement
  • Create, display, change, and delete a user profile
  • Identify the steps you should perform to test a profile that you have created

Topic Outline

Basic User Profile Options

Security Options

Group Member Options

Job, Message, and Output Options

Environment Options

Commands for Working with User Profiles

Creating User Profiles

Using Profile Commands

Testing the Profiles You Have Created


The course is intended for the security officer or administrator who is responsible for enrolling new users on the system. It is also valuable for managers and other personnel who will participate in system security decisions.


This course assumes that you are familiar with the concepts and basic operations of IBM i systems. You can satisfy these prerequisites by successfully completing the courses in the following series:

Finally, the course assumes that you have an understanding of IBM i security. You can satisfy this prerequisite by successfully completing the previous courses of this series:

You may also have obtained these skills by taking other courses or through relevant work experience.