Solved

Automating AS400 Session Creation in Client Access

Posted on 2007-03-23
5
645 Views
Last Modified: 2008-02-01
We use an application called IBM Iseries Access, formerly known as Client Access.  We use this to create terminal emulation sessions to connect to the AS400.  The emulator part of this application uses a *.ws file to get it's workstation ID name and server name, along with other settings.  I'd like to be able to create a batch file or a script to automate this for each user that logs onto the PC.  Is this possible or if it is, does anyone know where I can find such a script or the "how to info" on how to accomplish this?

Thanks.

0
Comment
Question by:mtmtech
5 Comments
 
LVL 14

Accepted Solution

by:
daveslater earned 125 total points
ID: 18783696
How automatd.
It would be easy to write a VB program that created the file based on a tamplate.
How would you want to identify the workstation ID or would you allow the iSeries to auto allocate?

Dave
0
 

Author Comment

by:mtmtech
ID: 18790617
I would want LSL, VA, or MN, appended to the front of the name and the last part could be the user name.
0
 
LVL 27

Assisted Solution

by:tliotta
tliotta earned 125 total points
ID: 18803554
mtmtech:

You can certainly edit the .WS files and/or write them yourself. Once the .WS file type is associated with iSeries Access emulation, Windows will handle the rest. You might have a .bat file that contains:

  start  c:\"Documents and Settings"\mtmtech\Desktop\myAS400.ws

Assuming that your AS/400 workstation file is named myAS400.ws and the file is stored on your PC desktop and you're signed on as mtmtech, then that should kick off an emulator session based on whatever you put into myAS400.ws. (Note that "Documents and Settings" has embedded spaces. If you don't use the DOS name in a path, then embedded spaces require quotes.)

You can do basic testing by entering the START command in a Windows command line.

Tom
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DataMirror Latency 3 73
Change a nightly backup CL program 5 221
iSeries, AS/400 GUI 9 116
Is Cross Site Request Forgery (CSRF) & XSS applicable to RPG coding? 10 149
In the hope of saving someone else's sanity... About a year ago we bought a Cisco 1921 router with two ADSL/VDSL EHWIC cards to load balance local network traffic over the two broadband lines we have, but we couldn't get the routing to work consi…
A customer recently asked me about anti-malware and the different deployment options available for his business. Daily news about cyberattacks, zero-day vulnerabilities, and companies that suffered a security breach made him wonder if the endpoint a…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now