Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

ODBC Connections

Posted on 2007-12-04
2
1,147 Views
Last Modified: 2012-08-14
Greetings,

When I have determined that when I do a WRKACTJOB I can see ODBC Connections because they look like the following.
         
 Opt  Subsystem/Job  User        Type  CPU %  Function        Status            
        QZDASOINIT   QUSER       PJ       .0                   TIMW            
        QZDASOINIT   QUSER       PJ       .0                   TIMW            

In order to find the "User" whos connection one of those jobs belongs to, I have to do a 5 (work with job) and then 10 "Display Job log"
Then I get the IP address and from that go to our network guys and ask them whos computer it is.

Our users sign in with their own Username and password..  
Is there ANY way to get that to show up under the "User" column? instead of QUser?
If I cant do that, does anyone know of a report I could run that would show me active ODBC connections and the username and IP address?  
We do also have a product called Standguard, but I am unsure on how to use it. I know that product can be used to block access but I have a feeling that after it was installed, everything was left wide open..  The person in "Charge" of it quit about a month ago.
0
Comment
Question by:ScottParker
2 Comments
 
LVL 4

Accepted Solution

by:
rward earned 500 total points
ID: 20404863
Brian Dietz has a freeware utility called WRKODBCJOB that will do what you want.  You can find it at http://home.columbus.rr.com/jbmmdietz/wrkodbcjob.html
0
 
LVL 3

Author Closing Comment

by:ScottParker
ID: 31412630
Just what I was looking for.. Thanks.
0

Featured Post

Networking for the Cloud Era

Join Microsoft and Riverbed for a discussion and demonstration of enhancements to SteelConnect:
-One-click orchestration and cloud connectivity in Azure environments
-Tight integration of SD-WAN and WAN optimization capabilities
-Scalability and resiliency equal to a data center

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
RPG IV and RPG ILE book 4 451
Check for files on IFS. if found, copy to one folder, move to another 1 190
DB2 return first match 3 116
IBM Lotus Notes Rules not working 5 239
This article describes how to reset your Windows 10 password when you've forgotten it.
The advancement in technology has been a great source of betterment and empowerment for the human race, Nevertheless, this is not to say that technology doesn’t have any problems. We are bombarded with constant distractions, whether as an overload o…
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question