...
If user security is activated, the UDM Server logs the user onto the system, and the command is run with the user's identity. If user security is not activated, the command runs with the same identity as the Server.
Usage
Method | Syntax | IBM i | UNIX | Windows | z/OS |
Configuration File Keyword | security option |
Values
option is any of the following values:
...
Note | ||
---|---|---|
| ||
For UNIX, Windows, and z/OS: The inherit value replaces the none value. There currently are no plans to deprecate support for none, but new installs should use inherit instead of none. |
Default Values
default | AIX, HP-UX, Windows, z/OS |
pam | Linux, Solaris |