KB Article 3108

Contact Tech Support

 Email Tech Support
 (250) 655-1766
 [7:30 - 5:00 PST]
Your Meeting ID will be Provided by a Rep.
Tech Support
Tech Support Home
Software Updates
Knowledge Base Search
Recent KB Articles
Product FAQs
Code Samples
Tech Blog
System Requirements
Installation Instructions
Support Testimonials
Contact us to...
Create a Ticket
Request a Free Demo
Suggest a New Feature
Submit Feedback
Upload a Large File
Other Services
Software Training
Professional Services

What are Access Control Lists?

Product: WebSmart ILE Type: Frequently Asked Question

Access Control Lists can be used to protect static files in various IFS directories. They cannot be used to protect the execution of CGI programs. They work as an additional level of protection on top of the protection provided by IBM i user profiles or validation lists using the protect directive.

This is more fully discussed in the User's Guide.

Rate This Article

Did this example help you to achieve your goal?
 Yes  No  Don't Know

Enter additional comments below.   If you want to hear back from us, include your contact information.

Email Address:
Please enable JavaScript in order to rate this page.