Details tab fields identify the priority, status, and category of a rule. For the Default rule, fields on this tab cannot be changed.
When a field or value has a different name than its 5250 user interface equivalent, the 5250 name is shown in parentheses () at the end of the description.
Priority
Identifies the priority of the rule. The priority is used by the rules engine when searching for a rule that matches the context of the authentication request. Rules are searched in priority ascending order and the rules engine stops the search after it finds a rule that matches the context of the request. The possible values are between 0 and 8999.
Status
Enabled | The rule is active and may be selected by the rules engine to be used for authentication. (Held=N) | |
Disabled | The rule is not active and will not be selected by the rules engine to be used for authentication. (Held=Y) |
Description
Provides a description of the rule. (5250 field: Rule Description)
Category
Identifies the category to which the rule belongs. Categories provide a means of easily identifying rules associated with a type of authentication request. Rules within a category use preset defaults for their function and their calling program. The values that are displayed and editable in the Rule Details dialog may vary by rule category.
Sign On | Rules in this category can authenticate user profiles when they sign on to the IBM i system. | |
Server Access | Rules in this category can authenticate users when using applications to access server connections such as FTP, ODBC, or JDBC. Used with Web Listener or 5250 Listener rules. | |
File Access | Rules in this category can authenticate users when accessing files using the IBM i Data File Utility (DFU). | |
SQL Access | Rules in this category can authenticate users when accessing files using SQL commands. | |
Web Listener | Rules in this category can be used to present authentication requests to users via the web listener when connecting to servers, such as FTP, ODBC, or JDBC. Used with rules where Listener is specified for the Action field. For more information about the web listener, refer to Assure Security application server requirements under Assure Security Multi-Factor Authentication User Guide |
|
5250 Listener | Rules in this category can be used to present authentication requests to users via the 5250 listener when connecting to servers, such as FTP, ODBC, or JDBC. Used with rules where Listener is specified for the Action field. | |
Reset Password | Rules in this category provide the ability for users to reset their IBM i password. For more information about resetting passwords, refer to Configure and use the profile password reset self-service option under Assure Security Multi-Factor Authentication User Guide |
|
Enable Profile | Rules in this category provide the ability for users to enable their IBM i user profile. For more information about enabling profiles, refer to Configure and use rules for the profile enable self-service option under Assure Security Multi-Factor Authentication User Guide |
|
Custom | Rules in this category can authenticate users to access the system, applications, or data. | |
Default | Defines the default action taken for users accessing the system, applications, or data when no other rules match the context of the request. |