An iSeries user is denied access to \\iSeries\QIBM

Posted on 2011-05-04
Last Modified: 2012-08-13
To ensure we install the latest Client Access, we began installing it on users PCs by going to Start > Run > \\\QIBM.  Unfortunately, when another IT tech attempts to install Client Access while he is logged on to the PC, he is denied access.  When he's on a Windows 7 machine, he receives a Network Error message saying "You do not have permission to access \\iSeries\QIBM. Contact your network admin to request access."  On an XP machine, he's prompted and enters his credentials but prompt returns immediately.  We explicitly granted him full authority to access QIBM, but still no success.  His iSeries user class is QSYSOPR.  His password contains only letters and numbers, with the first letter being upper case.  He is the only user being denied access.  Share permissions on QIBM are "Public: Read & Execute".  Our system security level is 40.

Any ideas?

Question by:jdr0b1ns0n
    LVL 34

    Accepted Solution

    Mixed-case passwords from Win7 to AS/400 NetServer are a problem in certain cases:

    1) What is the AS/400 system value QPWDLVL set to?
    2) If not, do his Windows and AS/400 usernames match?
    3) Are you certain his AS/400 password matches his Windows password?  Reset both to be sure.
    4) Is he logged in to Windows using a domain account or a local account?
    5) Is the AS/400 a member of the domain? (Check the Netserver configuration.  Google "netserver configuration").

    Post back if you need more help, and include the answers to the questions.  These articles will probably solve your issues:

    Password case options:
    Windows 7 with Netserver:
    Windows XP Netserver reprompting:

    - Gary Patterson

    Author Closing Comment

    Mixed case passwords from XP & Win7 are a problem when accessing QIBM

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Better Security Awareness With Threat Intelligence

    See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

    In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
    DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now