mqsireportflowuserexits command
Use the mqsireportflowuserexits command to report the list of active and inactive user exits for the specified integration node, integration server, or message flow.
Supported platforms
- Windows
- Linux®
- AIX®
- IBM® z/OS® Container Extensions (zCX). Run this command by modifying and submitting the supplied JCL or by using an IBM z/OS console command.
Purpose
Use the mqsireportflowuserexits command to generate a report about the status of user exits:
- If you specify only the integration node name, the command returns:
- A list of all user exits that you set to be active at the integration node level by using the mqsichangeflowuserexits command.
- A list of all user exits that you set to be inactive at the integration node level by using the mqsichangeflowuserexits command.
- The full path name of the user exit path, which is the directory from which the integration node searches for all user exits.
- If you specify the integration node and integration server names, the command returns the list
that is returned for the integration node name only, plus:
- A list of all user exits that you set to be active at the integration server level by using the mqsichangeflowuserexits command.
- A list of all user exits that you set to be inactive at the integration server level by using the mqsichangeflowuserexits command.
- If you specify the integration node, integration server, and message flow names, the command
returns the list that is returned for the integration node and integration server names, plus:
- A list of all user exits that you set to be active at the message flow level by using the mqsichangeflowuserexits command.
- A list of all user exits that you set to be inactive at the message flow level by using the mqsichangeflowuserexits command.
Select the appropriate link for details of this command
on the platform, or platforms, that your enterprise uses:
Authorization
For more information about platform-specific authorizations, see the following topics:
If you enable administration security, you must also set up the authority
that is detailed in Tasks and authorizations for administration security.