Where allowed to run: All environments (*ALL) Threadsafe: No |
Parameters Examples Error messages |
The Change System Directory Attributes (CHGSYSDIRA) command changes system directory attributes used when working interactively with the directory and the directory shadow systems.
An override program is provided that fills in the values of these directory attributes.
Restrictions:
Top |
Keyword | Description | Choices | Notes |
---|---|---|---|
SCHTYPE | Type of search | *EXACT, *GENERIC, *SAME | Optional, Positional 1 |
SCHPGM | Search program | Single values: *SAME, *NONE Other values: Qualified object name |
Optional, Positional 2 |
Qualifier 1: Search program | Name | ||
Qualifier 2: Library | Name, *LIBL, *CURLIB | ||
VRFPGM | Verification program | Single values: *SAME, *NONE Other values: Qualified object name |
Optional |
Qualifier 1: Verification program | Name | ||
Qualifier 2: Library | Name, *LIBL, *CURLIB | ||
SUPPGM | Supplier program | Single values: *SAME, *NONE Other values: Qualified object name |
Optional |
Qualifier 1: Supplier program | Name | ||
Qualifier 2: Library | Name, *LIBL, *CURLIB | ||
RTYITV | Retry interval | 1-999, *SAME | Optional |
RTYLMT | Retry limit | 0-9, *SAME | Optional |
ALWDSPNUI | Display network user ID | *NO, *YES, *SAME | Optional |
MSGQ | Message queue | Single values: *SAME Other values: Qualified object name |
Optional |
Qualifier 1: Message queue | Name | ||
Qualifier 2: Library | Name, *LIBL, *CURLIB | ||
RMTSHD | Shadow remote users | *NO, *YES, *SAME | Optional |
RMVJOBLOG | Remove shadowing job logs | *NO, *YES, *SAME | Optional |
ALWSCH | Allow search | *NO, *YES, *SAME | Optional |
USRDFNFLD | User-defined fields | Single values: *SAME Other values (up to 100 repetitions): Element list |
Optional |
Element 1: Field name | Character value | ||
Element 2: Product ID | Character value, *NONE | ||
Element 3: Function | *ADD, *RMV, *CHG, *KEEP | ||
Element 4: Field type | *DATA, *MSFSRVLVL, *ADDRESS | ||
Element 5: Maximum field length | 1-512 |
Top |
Specifies the type of search to be applied to the Search System Directory display. The search attribute specified on this parameter applies to the system.
Top |
Specifies the user exit program that performs a customized search from the Search System Directory display. More information about the user exit program is in the Application programming interfaces information in the iSeries Information Center at http://www.ibm.com/eserver/iseries/infocenter.
If a user exit program is specified, it must exist.
The name of the program can be qualified by one of the following library values:
Top |
Specifies the user exit program that verifies a change, add, or delete operation for directory entries, departments, and locations that are local or shadowed. This program is called from both a local data entry and from directory shadowing. More information about the user exit program is in the Application programming interfaces information in the iSeries Information Center at http://www.ibm.com/eserver/iseries/infocenter.
Changes are always verified by the system. If a user exit program is not supplied, no additional verification checking is required by the system. When a user exit program is supplied, the user exit program is called and then system validation is performed.
If a user exit program is specified, it must exist.
The name of the program can be qualified by one of the following library values:
Top |
Specifies the user exit program that decides whether a change, add, or delete operation for directory entries, departments, and locations is to be shadowed to a collector system. This program is called from directory shadowing. More information about the user exit program is in the Application programming interfaces information in the iSeries Information Center at http://www.ibm.com/eserver/iseries/infocenter.
If a user exit program is not supplied, all changes are sent to the collector system. When a user exit program is supplied, the user exit program is called and then directory shadowing is performed.
If a user exit program is specified, it must exist.
The name of the program can be qualified by one of the following library values:
Top |
Specifies the number of minutes to wait after an unsuccessful shadow before attempting to shadow again.
Top |
Specifies the number of times to retry a directory shadow before the operation fails.
Top |
Specifies whether to allow all network user IDs to be displayed or printed by all users. The network user IDs are always displayed or printed for system administrators or for users who display or print their own directory entries.
Top |
Specifies the qualified name of the message queue to which messages are sent.
The name of the message queue can be qualified by one of the following library values:
Top |
Specifies whether to supply additions, changes, or deletions of locally-defined remote directory entries during directory shadowing. Locally-defined remote directory entries are added locally, but have a system name that is different from the local system name. Changes are always supplied for local directory entries and for shadowed entries.
Top |
Specifies whether to delete job logs created during previous directory shadow collections from a specific supplier system. More information about this parameter is in the SNA Distribution Services book, SC41-5410.
Top |
Specifies whether to allow a search on the system distribution directory.
Top |
Specifies the user-defined field names, function, field type, and maximum field length on the user-defined field names. You can add, remove, or change user-defined field names in the system distribution directory for the system with this parameter.
If the specified user-defined field name exists on a supplier shadowing system, the data is automatically initialized on your system the next time you collect from that supplier system. After the initialization, any changes made to that field on other shadowing systems are updated on your system when it is shadowed. If there are user-defined fields on other shadowing systems that are not defined on your system, then these fields and their value are passed through to the other shadowing systems so the data is not lost.
If the user-defined field name does not exist on a supplier system but exists in the network, the user-defined field will not get initialized. To get the user-defined field initialized on your system, add it to the supplier system where the supplier system shadows data from a system with the user-defined field.
Up to 100 user-defined fields can be specified.
The possible User-Defined-Field Name value is:
The possible User-Defined-Field Product ID values are:
The possible User-Defined-Field Function values are:
The possible Field Type values are:
Field type is required for function *ADD and optional for *CHG. It will be ignored for function *KEEP and *RMV.
The possible User-Defined-Field Maximum length value is:
Top |
Example 1: Changing the Search Type to Generic
CHGSYSDIRA SCHTYPE(*GENERIC)
This command searches the Search System Directory display to find all matches that begin with the specified text string. For example, a search for Smith may result in Smith, Smithsonian and Smithton.
Example 2: Changing the Shadowing Retry Attributes
CHGSYSDIRA RTYITV(10) RTYLMT(3)
This command changes the attributes that control the available options when shadowing fails. The interval between failures is 10 minutes with a maximum of three retries for this example.
Top |
*ESCAPE Messages
Top |