General security system values

This topic introduces the general system values that you can use to control security on your IBM® i operating system.

Overview:

General security system values allow you to set security function to support the decisions you made when developing your security policy. For example, in your security policy you state that systems containing confidential information, such as customer accounts or payroll inventories, need a stricter level of security than systems used for testing applications that are developed within your company. You can then plan and set a security level on these systems that corresponds with the decisions you made while developing your security policy.

Purpose:
Specify system values that control security on the system.
How To:
WRKSYSVAL *SEC (Work with System Values command)
Authority:
*ALLOBJ and *SECADM
Journal Entry:
SV
Note:
Changes take effect immediately. IPL is required only when changing the security level (QSECURITY system value) or password level (QPWDLVL system value).

General system values that control security on your system are as follows:

QALWUSRDMN
Allow user domain objects in the libraries
QCRTAUT
Create default public authority
QDSPSGNINF
Display sign-on information
QFRCCVNRST
Force conversion on restore
QINACTITV
Inactive job time-out interval
QINACTMSGQ
Inactive job message queue
QLMTDEVSSN
Limit device sessions
QLMTSECOFR
Limit security officer
QMAXSIGN
Maximum sign-on attempts
QMAXSGNACN
Action when maximum sign-on attempts exceeded
QRETSVRSEC
Retain Server Security
QRMTSIGN
Remote sign-on requests
QSCANFS
Scan file systems
QSCANFSCTL
Scan file systems control
QSECURITY
Security level
QSHRMEMCTL
Shared memory control
QUSEADPAUT
Use Adopted Authority
QVFYOBJRST
Verify object on restore