Force conversion on restore

This system value allows you to specify whether or not to convert some object types during a restore. You can also use it to prevent some objects from being restored.

This system value allows you to specify whether or not to convert the following object types during a restore: It can also prevent some objects from being restored. An object which is specified to be converted by the system value, but cannot be converted because it does not contain sufficient creation data, will not be restored.

The *SYSVAL value for the FRCOBJCVN parameter on the restore commands (RST, RSTLIB, RSTOBJ, RSTLICPGM) uses the value of this system value. Therefore, you can turn on and turn off conversion for the entire system by changing the QFRCCVNRST value. However, the FRCOBJCVN parameter overrides the system value in some cases. Specifying *YES and *ALL on the FRCOBJCVN will override all settings of the system value. Specifying *YES and *RQD on the FRCOBJCVN parameter is the same as specifying 2 for this system value and can override the system value when it is set to 0 or 1.

QFRCCVNRST is the second of three system values that work consecutively as filters to determine if an object is allowed to be restored, or if it is converted during the restore. The first filter, verify object on restore (QVFYOBJRST) system value, controls the restore of some objects that can be digitally signed. Only objects that can get past the first two filters are processed by the third filter, the allow object restore (QALWOBJRST) system value, which specifies whether or not objects with security-sensitive attributes can be restored.

The shipped value of QFRCCVNRST is 1. For all values of QFRCCVNRST an object which should be converted but cannot be converted will not be restored. Objects digitally signed by a system trusted source are restored without conversion for all values of this system value.
Note: This system value is a restricted value. See Chapter 3: ″Security System Values″ in the iSeries Security Reference for details on how to restrict changes to security system values and a complete list of the restricted system values.