Using best practices to set up a library list - Assure_DB2_Data_Monitor_(DB2MON) - Assure_Elevated_Authority_Manager_(EAM) - Assure_Encryption - Assure_Monitoring_and_Reporting_(AMR) - Assure_Secure_File_Transfer - Assure_Secure_File_Transfer_ - Assure_Secure_File_Transfer_PGP - Assure_Secure_File_Transfer_with_PGP - Assure_Security_Multi-Factor_Authentication_(MFA) - Assure_System_Access_Manager_(SAM) - Required_for_All_Modules - assure_ioptimize - assure_itera - assure_mimix - 10.0

License Manager for IBM i Products

Product type
Software
Portfolio
Integrate
Product family
Assure
Product
Assure Security > Assure Secure File Transfer with PGP
Assure iOptimize
Assure iTERA
Assure Security > Assure Security Multi-Factor Authentication (MFA)
Assure Security > Required for All Modules
Assure Security > Assure Elevated Authority Manager (EAM)
Assure Security > Assure DB2 Data Monitor (DB2MON)
Assure QuickEDD
Assure MIMIX™ Software
Assure Security > Assure Secure File Transfer
Assure Security > Assure Monitoring and Reporting (AMR)
Assure Security > Assure Encryption
Assure Security > Assure System Access Manager (SAM)
Version
10.0
Language
English
Product name
Assure
Title
License Manager for IBM i Products
Copyright
2023
First publish date
1999
Last updated
2024-10-10
Published on
2024-10-10T14:44:52.622224

A library list contains a system portion and a user portion. When modifying a library list, following best practices ensures consistent and predictable results. Best practices dictate that specific libraries must exist in your system library list. Similarly, certain product-related libraries should not be kept within the system portion of the library list, while other product-related libraries should not be added to the user portion of the library list.