Sign-on system values: Remote sign-on

The Remote sign-on system value is also known as QRMTSIGN. You can use this system value to specify remote sign-on information.

Quick reference
Location From IBM® Navigator for i, select Configuration and Service > System Values. Right-click on Signon and click Properties, then select theRemote tab.
Special authority All object (*ALLOBJ) and security administrator (*SECADM).
Default value Always display sign-on.
Changes take effect Immediately.
Lockable Yes.
Lockable system value
(See Lock function of security-related system values for details.)

What can I do with this system value?

You can specify the following remote sign-on options:

Always display sign-on (*FRCSIGNON)
All remote sign-on sessions are required to go through normal sign-on processing.
Allow sign-on to be bypassed (*SAMEPRF)
The system allows the user to bypass sign-on.
If you select to bypass sign-on, you can also specify Verification (*VERIFY) to verify source and target user IDs or to verify user IDs on the target system. The sign-on is still bypassed, but the user ID is verified before it is allowed access to the system.
  • Source and target user IDs must match

    For 5250 display station pass-through or workstation functions, you can bypass the remote sign-on panel when the source and target user profile names are the same.

  • Verify user ID on target system

    After verifying that the user has access to the system, the system allows the user to bypass the sign-on panel.

Reject remote sign-ons (*REJECT)
This option allows no remote sign-on for 5250 display station pass-through or for workstation functions. When this option is selected, users can still sign on to the system by using Telnet. These sessions go through normal sign-on processing. If you want to reject all Telnet requests to the system, end the Telnet server.
Invoke user-written exit program
You can specify a program and library to decide which remote sessions are allowed and which user profiles can be automatically signed on from which locations. The program must exist in the system disk pool (also known as auxiliary storage pool) or in a basic user disk pool.