If the SCCM update is stuck in downloading state for a long time, the best way to resolve this issue is to use the CMUpdate Reset Tool. To use the SCCM update reset tool, you will need the Package GUID of the update. The QuickStartGuide contains instructions for deploying the product that work for most users running Windows, Mac, or Linux. To install this product for a single user, or for a multi-user PC, see the QuickStartGuide in the Documentation folder. Show
Additional details about the product, other deployment options and customizing the product are included in the remainder of this document. Contents:0.5 QuickStartGuide1.0 Introduction 2.0 Features 3.0 Prerequisites 4.0 Product Contents 5.0 Installation 5.1 Updating an Existing Installation 5.2 Setting up a Configured Update Location 5.3 Optional IBM i PTFs 6.0 File Permissions 6.1 File Permissions (Linux, Mac, AIX) 6.2 File Permissions (Windows) 7.0 Starting the Product 7.1 Starting the Product 7.2 Starting the Product (using a script) 7.3 Starting the Product (using the command-line) 8.0 Configuration 8.1 Configuration Location 9.0 Advanced Topics 9.1 More command-line Options 9.2 File Associations 9.2.1 File Associations (for Windows) 9.2.1.1 Change Icon (for Windows Shortcut) 9.2.2 Setting up a Desktop Icon (for Linux) 9.2.2.1 File Associations (for Linux) 9.2.3 File Associations (for Mac) 9.2.3.1 Create File Associations (for Mac) 9.2.3.2 Change Icon (for Mac) 9.3 Changing Configuration Location 9.4 Other Deployment Options 9.4.1 Automatically import configuration settings 9.4.2 Native IBM i Deployment 9.5 Customized Packages 9.6 Migrating from IBM i Access for Windows 9.6.1 Migrating System Configurations 9.6.2 Migrating 5250 Emulation 9.6.3 Migrating Saved Data Transfer Request Files 9.6.4 EHLLAPI 9.6.5 Kerberos 9.6.6 5250 Compatibility 9.7 Key Management 9.8 Data Transfer 9.8.1 Data Transfer Support for Excel and Calc Spreadsheets 9.8.2 Data Transfer Support for Character Truncation and Numeric Overflow 9.8.3 Data Transfer Sheet Name 9.9 Establishing a Console Connection to IBM i 9.10 Additional Fonts 9.11 Using Credentials from a netrc File 9.12 Integrated File System (IFS) 9.12.1 IFS, QFileSvr.400, and Security 9.12.2 IFS Authority 9.12.3 IFS Limitations 9.12.4 IFS and Independent ASPs 9.12.5 IFS Performance 9.13 Secure Shell (SSH) Terminal 9.13.1 SSH Terminal Prerequisites 10.0 Service Diagnostics 11.0 Frequently Asked Questions (FAQ) 12.0 Update History 1.0 IntroductionIBM i Access Client Solutions is the newest member of the IBM i Access family of products. It provides a Java based platform-independent interface which runs on most operating systems that support Java including Linux, Mac, Windows, and IBM i. IBM i Access Client Solutions consolidates the most commonly used tasks for managing your IBM i into one simplified location. IBM i Access Client Solutions uses the same IBM i host servers as the other IBM i Access Family products. Also available are four optional packages which include middleware for using and developing client applications for Windows, Linux, Mac, and PASE: Customers using IBM i 7.3 or later that have current entitlement can acquire IBM i Access Client Solutions by either of the following two methods:
Customers can acquire media by ordering 5761-SS1 or 5770-SS1 refresh feature 6288. The physical media contains a runnable version of the product which allows you to run the product directly from the CD. The physical media also includes a .zip file of the product which can be copied and extracted to a location of your choice. The physical media for IBM i Access Client Solutions does not contain the optional Windows, Linux, Mac, and PASE Application Packages. For additional information visit: For the latest information about IBM i Access Family products visit: 2.0 FeaturesFeatures of IBM i Access Client Solutions include:
The optional Windows Application Package includes:
The optional Linux, Mac, and PASE Application Package includes:
3.0 Prerequisites3.1 Prerequisites (workstation)IBM i Access Client Solutions runs on most operating systems that support Java 8.0 or higher including various versions of Linux, Mac and Windows. Recommendation: One way to check the version of Java installed on your system is to bring up a prompt where a command may be entered (Command Prompt, Shell, Terminal, etc) and then type the command: The following output indicates version 8.0 is installed: Here are some websites of Java providers. Make sure you are running with the most up-to-date version of Java for your platform. Technote for Mac: 3.2 Prerequisites (Connectivity to IBM i)IBM i Access Client Solutions connects to any supported IBM i release. IBM i Access Client Solutions uses the same IBM i host servers as the other IBM i Access Family products. If you use Navigator for i, load and apply the latest "IBM HTTP Server for i" Group PTF for your release. See the following web page for the latest IBM i Group PTFs: https://www.ibm.com/support/pages/ibm-i-group-ptfs-level. 4.0 Product ContentsThe following files and directories are contained in the product .zip file: acsbundle.jar - an executable jar file of the product
AcsConfig.properties- file containing configuration settings (also exists
inside acsbundle.jar)
Mac_Application - directory containing install script for Mac
Linux_Application - directory containing install scripts for Linux
Windows_Application - directory containing install scripts for Windows
Start_Programs - directory containing platform specific binary files which
can be used to start the product.
Linux_i386-32
Linux_x86-64
Mac_i386-32_x86-64
Windows_i386-32
Windows_x86-64
Documentation - directory containing documentation
QuickStartGuide - information for how to get started
GettingStarted - detailed information about the product
License - directory containing terms and conditions for usage
Notices - directory containing notices and information
properties - directory containing product version information
Sample_Scripts - directory containing sample scripts which can be used to
start the product if the binary files in Start_Programs
do not work.
Linux_Mac_Other - directory of Perl scripts for starting the product
on any platform where Perl is available.
Windows - directory containing a JScript for starting on Windows
Icons - directory containing files which can be used as icons
Fonts - directory where additional monospaced fonts may be
added for 5250 emulation
5.0 InstallationThe packaging of IBM i Access Client Solutions provides several installation options from the very simple single user installation, to the more advanced multi-user installations. Installation scripts have been provided in the Mac_Application, Linux_Application, and Windows_Application folders (see section 4.0 Product Contents) which can be used for a variety of installation options. For a single user installation on Mac, Linux, and Windows, or a multi-user installation on a Windows PC, see the QuickStartGuide. The QuickStartGuide explains how to use the provided installation scripts for doing these types of simple installs. If you are an administrator planning on deploying this to several users, you should read the following articles: For administrators that would like to automate the install in silent mode, use the /AdminConfig parameter to pre-configure the installation. Then use the /Q parameter during the actual installation. For Example: Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
In addition to the above options, you also have the option of just unpacking the .zip file to any location of your choice. This can be any location where the workstation has read authority to access the files. This includes the local hard disk drive, a remote network (shared) drive or portable media such as a CD or USB flash drive. Unpacking the .zip file completes the installation. Technical Note: 5.1 Updating an Existing InstallationEnhancements and fixes are available on a periodic basis. These updates are provided as a complete product installation. When these updates are available, you should update your existing installation. For users maintaining their own installation: Option 1: Option 2: For administrators maintaining a version of the product in a central location accessed by multiple users: Option 1: Option 2: Option 3: After following the appropriate steps above, restart the product. Help->About from the main GUI can be used to verify the updates were applied. 5.2 Setting up an IBM i Update LocationAdministrators can use an IBM i system as their central location for doing installs and applying updates. Regardless of how you initially deploy the product to your users, you can use a central location on an IBM i so that your users can apply an update with a click of a button. Here are the steps:
Setting the com.ibm.iaccess.CheckUpdateSystem property causes Help->Check for Updates to behave differently. Instead of checking an external web location for the availability of an updated version, the above IBM i location is checked for updated product files. An update is detected when the timestamp of any required product file changes. The timestamp is displayed on the Help->Check for Updates panel with an option to install the update. The user will need valid credentials to the system specified for com.ibm.iaccess.CheckUpdateSystem. If their credentials have not already been cached from a previous connection to this system, they are prompted to provide valid credentials. Failing to provide valid credentials will result in updates not being detected. Users that have an IBM i Update Location configured and have selected the option "Notify when update is available" under Edit->Preferences, will not be prompted to provide credentials. They will only get notified of an available update if they have successfully connected to the com.ibm.iaccess.CheckUpdateSystem since the last time they logged in to their PC. Note:
Special note for administrators that maintain a customized AcsConfig.properties file within acsbundle.jar: 5.3 Optional IBM i PTFsFor Administrators that want to maintain a centralized location on an IBM i for their users to install and update the product, release-specific PTFs are available that will provide the extracted contents of IBMiAccess_v1r1.zip at: See the following web page for the latest PTFs: https://www.ibm.com/support/pages/ibm-i-access-client-solutions-5733xj1. These PTFs are superseded for each product update and will normally be available within 2 weeks of the availability of the product update. 6.0 File PermissionsSection 7.0 Starting the Product describes several different ways to start IBM i Access Client Solutions. If you use one of the provided binary files or scripts to start the product, you need to make sure its file permissions have the execute permission enabled. The file permissions assigned while unpacking the .zip file are determined by several factors including the operating system, the archive utility used to unpack the .zip file, the authority of the user, etc. If you have trouble using one of the provided binary files or scripts, check the file permissions. The following sections describe some methods for checking the file permissions. 6.1 File Permissions (Linux, Mac, AIX)For unix-like operating systems, you can use the following command from a shell or terminal prompt to check the permissions of a file: ls -l <file> To change the permissions of a file, you can use the following command: chmod <permission> <file> For example, to add read and execute permission for everyone: chmod a+rx <file>
to give the owner of the file read/write/execute permission and only read/execute for everyone else: chmod 755 <file>
Additional help for the ls and chmod commands is readily available on the internet. 6.2 File Permissions (Windows)For Windows, while viewing the file using Windows explorer, right-click the file and select properties. The security tab should contain the file permissions. Make sure you have Read and Execute permission. On recent versions of Windows, you may also use the icacls command to view and change the permission of a file. 7.0 Starting the ProductThere are multiple ways to start IBM i Access Client Solutions. If you used the installation scripts to install the product, the easiest way to start the product is found in the QuickStartGuide. If the product was not installed using the installation scripts, the remainder of this section will describe alternative ways to start the product. Since there are a variety of ways and locations how/where Java can be installed, some of the methods may require additional configuration. If one of the methods below does not work, try a different method. In some cases, additional guidance is provided. When using a binary file or script as described below, the binary file or script must be in the same directory structure as contained in the .zip file. For convenience, you may also copy/move the binary file(s) and/or scripts for your platform(s) to the same directory where the acsbundle.jar exists. 7.1 Starting the ProductTo start the product from a file viewer (e.g. Windows Explorer, Mac OS X Finder, etc) using a platform specific binary file, locate the sub-directory in Start_Programs that identifies your operating system and hardware architecture. Locate the binary file your operating system recognizes. Then double-click it to start the product. You may also start the product with this binary file from a Command Prompt, Terminal, or Shell. If you get the following error: 7.1.1 Starting the Product - Additional OptionsYou may also try one of the following methods when trying to use the binary file for your platform. These methods allow you to identify which Java Runtime Environment (JRE) should be used to start the product. See section 7.1.2 Finding the Java Home Path for how to locate the Java home path on your workstation. These additional methods are only supported on Linux and Windows platforms:
7.1.2 Finding the Java Home PathIf you can start the product using one of the methods in section: The java.home property contains the location of the Java home path for your workstation. This is the path you will need to specify when setting the JAVA_HOME environment variable or when using the -vm option on the command. 7.1.2.1 Finding the Java Home Path (on Windows)On Windows platforms, search for java.exe. The Java binary is normally located in either a bin or jre/bin sub-directory below the Java home path. The Java home path may be used when setting either the JAVA_HOME environment variable or when using the -vm option on the command. 7.1.2.2 Finding the Java Home Path (on Linux)On Linux you can use the "which" command: which java
This will give you a path to the java command or a symbolic link to it.Resolve any symbolic links until you finally get to the actual binary file for the java command. You can resolve symbolic links by using the ls command with the -l option: ls -l <file>
The Java binary is normally located in either a bin or jre/bin sub-directory below the Java home path. The Java home path may be used when setting either the JAVA_HOME environment variable or when using the -vm option on the command.7.2 Starting the Product (using a script)There is a Sample_Scripts directory in the Documentation directory. The preferred way to start the product is by using a platform specific binary file available in Start_Programs. The scripts in Sample_Scripts should only be used if the platform specific binary does not work. To start the product from a file system browser (e.g. Windows Explorer, Mac OS X Finder, etc) using one of the supplied scripts, locate the script in the Sample_Scripts sub-directory that is compatible with your operating system. Most non-Windows based operating systems have Perl available by default. The Sample_Scripts/Linux_Mac_Other directory contains a Perl script (with three different file extensions) which can be used to start the product on any platform where Perl is available. Select the file that has a file extension that your operating system will recognize as a Perl script. Windows based operating systems have JScript available by default. The Sample_Script/Windows directory contains a JScript that can be used to start the product on Windows operating systems. Using a platform specific method to browse your file system (e.g. Windows Explorer, Mac OS X Finder, etc), locate the script your operating system recognizes. Then, double-click it to start the product. You may also start the product with this script from a Command Prompt, Terminal, or Shell. 7.3 Starting the Product (using the command-line)You may also start the product from the command-line from any place you can enter a command (Command Prompt, Terminal, Shell, etc) java -Xmx1024m -jar <path>/acsbundle.jar
where <path> is the location to the product's executable jar fileFor Example: Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
0or Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
1where <java_path> is the location of the java command for JDK 8.0 or higher.See section 7.1.2 Finding the Java Home Path for determining the complete path to the java command. You may also use any of the programs or scripts from the command-line. For example: Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
2Technical Note: 8.0 ConfigurationAdd a system configuration for each IBM i system you want to use or manage. To add a system configuration, select System Configurations from the Management tasks. Then select New. On the General tab, enter the System name. To get started, the System name is all that is necessary for performing General tasks. When you have finished, select OK to save the information you entered for this system, or select Save/New if you have additional systems you would like to add to the configuration. To configure a system to make a TLS/SSL connection, see Configuring Secure Connections. You may add new systems to your configuration or update existing configurations using the General, Connection, or the Console tabs at any time. For Console tasks, additional configuration is required. Console configurations are automatically associated with the System name you entered on the General tab. To enter the console configuration for a system, select System Configurations from the Management tasks. Select New or Edit. Then select the Console tab. The 5250 Console task requires a configured LAN console or a configured HMC console. If you do not have a configured LAN or HMC console, see section 9.9 Establishing a Console Connection to IBM i. The Hardware Management Interface task requires a configured hardware management interface. You may enter up to six hardware management interface configurations. When you have finished, select Close on the System Configurations panel. Using the System drop-down box on the main IBM i Access Client Solutions panel, select a System. All Console tasks automatically associate the selected System (entered on the General tab) with the console configuration (entered on the Console tab). You may now select a task for the selected system. If you select a Console task which does not have the corresponding information entered on the Console configuration tab, an error message is displayed. 8.1 Configuration LocationBy default, each user will have their own unique location for their configuration. The configuration root directory is determined in a platform dependent manner. The configuration directories are created during the initial start-up. To see where the configuration directory is: The configuration location cannot be changed while the product is running. To change the location of the configuration, see section 9.3 Changing Configuration Location 9.0 Advanced Topics9.1 More command-line OptionsMany of the functions that are available from the main GUI are also available from the command-line. These functions may be invoked by providing the appropriate parameters to any of the command-line options shown in: For example: Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
3Only the additional parameters are shown in the following sections: 9.1.1 Backup Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
4This will save the current configuration to the specified file. The resulting file may be used as input to the Restore command-line option on the same or different workstation (regardless of operating system). The location of the configuration to be saved is determined by the property: Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
5...which is located in the AcsConfig.properties file.This function is equivalent to File->Export Configuration from the main GUI. 9.1.2 Restore Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
6This will restore a saved configuration from the specified file. Any existing configuration not in the specified file is lost.The location of the restored configuration is determined by the property: Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
5...which is located in the AcsConfig.properties file.This function is equivalent to File->Import Configuration from the main GUI. Note: Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
89.1.3 Certdl Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
9Downloads a certificate authority (CA) from the specified IBM i system and stores it in the user's local truststore. This is required for server authentication with SSL.9.1.4 Cfg com.ibm.iaccess.CheckUpdateSystem=system_name (see Note 1 below)
com.ibm.iaccess.CheckUpdatePath=/path_where_zip_was_extracted (see Note 2 below)
0This allows various configuration options to be set from the command-line. These options may also be set from the main GUI using System Configurations.9.1.5 Dump com.ibm.iaccess.CheckUpdateSystem=system_name (see Note 1 below)
com.ibm.iaccess.CheckUpdatePath=/path_where_zip_was_extracted (see Note 2 below)
1Requests all running processes within the product to dump their threads. This information is used by IBM service to provide problem support.The logs generated may be accessed from the main GUI by: If no options are specified, this function is equivalent to the following function from the main GUI: Valid options are: com.ibm.iaccess.CheckUpdateSystem=system_name (see Note 1 below)
com.ibm.iaccess.CheckUpdatePath=/path_where_zip_was_extracted (see Note 2 below)
29.1.6 Medic com.ibm.iaccess.CheckUpdateSystem=system_name (see Note 1 below)
com.ibm.iaccess.CheckUpdatePath=/path_where_zip_was_extracted (see Note 2 below)
3Packages up the existing logs and thread dumps into a .zip file that can be sent to IBM for service.The resulting .zip file may be accessed from the main GUI by: 9.1.7 Log com.ibm.iaccess.CheckUpdateSystem=system_name (see Note 1 below)
com.ibm.iaccess.CheckUpdatePath=/path_where_zip_was_extracted (see Note 2 below)
4This plug-in enables the user to toggle their logging level from the command-line.The logging level may also be set from the main GUI by: 9.1.8 Logon com.ibm.iaccess.CheckUpdateSystem=system_name (see Note 1 below)
com.ibm.iaccess.CheckUpdatePath=/path_where_zip_was_extracted (see Note 2 below)
5This command will cache the user ID and password which can be used to prevent password prompting.9.1.9 props com.ibm.iaccess.CheckUpdateSystem=system_name (see Note 1 below)
com.ibm.iaccess.CheckUpdatePath=/path_where_zip_was_extracted (see Note 2 below)
6Brings up the same GUI panel as Edit->Preferences from the main GUI.9.1.10 Maint com.ibm.iaccess.CheckUpdateSystem=system_name (see Note 1 below)
com.ibm.iaccess.CheckUpdatePath=/path_where_zip_was_extracted (see Note 2 below)
7If no options are specified, no actions are performed.9.1.11 Ping com.ibm.iaccess.CheckUpdateSystem=system_name (see Note 1 below)
com.ibm.iaccess.CheckUpdatePath=/path_where_zip_was_extracted (see Note 2 below)
8This plug-in checks the connectivity to the IBM i by opening a connection to the appropriate port. If verifying an SSL connection, an SSL handshake is attempted. If it is launched from the main GUI, or invoked with /GUI=1, this plug-in displays a dialog. If launched from the command-line without /GUI=1, output is sent to the console.For non-SSL, the following services and ports are checked: com.ibm.iaccess.CheckUpdateSystem=system_name (see Note 1 below)
com.ibm.iaccess.CheckUpdatePath=/path_where_zip_was_extracted (see Note 2 below)
9For SSL, the following services and ports are checked: ls -l <file> 0This function can be launched from the main GUI by: 9.1.12 Sm ls -l <file> 1This plug-in starts the 5250 Session Manager GUI.This is equivalent to 5250 Session Manager from the main GUI. 9.1.13 5250 ls -l <file> 29.1.14 DTGui ls -l <file> 39.1.15 Download ls -l <file> 4The plug-in enables the user to run a previously saved Data Transfer download.Data Transfer is also available from the main GUI by selecting Data Transfer. 9.1.16 Upload ls -l <file> 5The plug-in enables the user to run a previously saved Data Transfer upload.Data Transfer is also available from the main GUI by selecting Data Transfer. 9.1.17 CLDownload ls -l <file> 6The plug-in enables the user to run a simple download of an entire file from the command line.9.1.18 Console ls -l <file> 7This plug-in starts a 5250 console to the specified system.This function is equivalent to 5250 Console from the main GUI. 9.1.19 VCP ls -l <file> 8This plug-in starts a Virtual Control Panel to the specified system.This function is equivalent to Virtual Control Panel from the main GUI. 9.1.20 L1C ls -l <file> 9This plug-in launches a browser to IBM Navigator for i using the specified system and port 2001.This function is equivalent to Navigator for i from the main GUI. 9.1.21 SPLF chmod <permission> <file> 0This plug-in displays the Printer Output GUI for viewing and downloading spool files from the IBM i.This function is equivalent to Printer Output from the main GUI. 9.1.22 KEYMAN chmod <permission> <file> 1This plug-in displays the Key Management tool.This function is equivalent to Tools->Key Management from the main GUI. 9.1.23 RMTCMD chmod <permission> <file> 2This plug-in sends CL command(s) to the specified system.This function is only available from the command line. 9.1.24 PWCHANGE chmod <permission> <file> 3This plug-in changes the password on the specified systems. It prompts the user for a userid, old and new passwords.This function may also be used from the main GUI by selecting the Passwords tab from Edit->Preferences 9.1.25 MIGRATE chmod <permission> <file> 4This plug-in provides the capability to copy system configurations back and forth between IBM i Access Client Solutions and the legacy Windows configuration supported by IBM i Access for Windows.This function may also be used from the main GUI by selecting File->Copy Connections 9.1.26 RESTRICTNote: This plug-in is only available to users with root or administrator authority. chmod <permission> <file> 5This plug-in provides the capability to anyone with administrator or root authority to restrict certain functions from all users on the current workstation. chmod <permission> <file> 6Functions may also be excluded as a group using keywords: chmod <permission> <file> 7The ability to restrict functions is also available to an administrator or user with root authority from the main GUI.Edit->Preferences Restrictions tab For an easy way to restrict functions on multiple workstations, see section 9.5 Customized Packages. *footnote - "Hardware Management Interface 1" and "Hardware Management Interface 2" may be renamed by setting properties com.ibm.iaccess.HMI1 and com.ibm.iaccess.HMI2 in AcsConfig.properties. 9.1.27 RESTRICTVIEW chmod <permission> <file> 8Lists the functions that are currently restricted on this workstation.9.1.28 FILEASSOC chmod <permission> <file> 9On a Windows platform, this sets the file associations for files of type .dttx, .dtfx, .hod, .bchx, .ws, .bch, and .sql. On a non-Windows platform, an error message is displayed.This function is equivalent to Tools->File Associations from the main GUI. 9.1.29 DTBATCH chmod a+rx <file>
0The plug-in enables the user to run a previously saved Data Transfer request.Data Transfer is also available from the main GUI by selecting Data Transfer. 9.1.30 PM5250 chmod a+rx <file>
1The plug-in enables the user to migrate files from the IBM i Access for Windows Personal Communications emulator to the IBM i Access Client Solutions emulator. Some converted files will have a new file extension. See section 9.6.2 Migrating 5250 Emulation.9.1.31 RSS chmod a+rx <file>
2The plug-in enables the user to run SQL statements and CL commands.9.1.32 DB2TOOLS chmod a+rx <file>
3The SQL Performance Center plug-in provides a set of tools to help you optimize the SQL in your database applications:
9.1.33 IFS chmod a+rx <file>
4Integrated File System provides an interface for browsing the Integrated File System of your IBM i and working with objects in the Integrated File System in the following ways:
9.1.34 DB2 chmod a+rx <file>
5The plug-in provides an interface for managing the Db2 for i databases on the IBM i.9.1.35 CHECKUPDATES chmod a+rx <file>
6The plug-in provides an interface to check for available updates.9.1.36 SSH chmod a+rx <file>
7SSH Terminal will launch an already-installed SSH client (terminal emulator) on your PC to the IBM i Integrated File System.9.1.37 OSSSETUP chmod a+rx <file>
8OSSSETUP will launch an interface that will allow you to manage open source packages on the IBM i.9.1.38 INSTALLUPDATES chmod a+rx <file>
9INSTALLUPDATES will check the configured IBM i system for available updates and will automatically download and install the update to the local PC installation. To configure an IBM i location for downloading updates, see section 5.2.9.1.39 HTTPPROXYUI chmod 755 <file>
0HTTPPROXYUI will launch a secured HTTP proxy that enables connectivity from an IBM i to the internet via the computer running this proxy. Access to the internet is enabled from any SSH Terminal session that enters the commands provided by the HTTPPROXYUI plug-in.Note: The SSH Terminal session must be running on the same computer as this proxy. 9.1.40 UDC Font Conversion chmod 755 <file>
1Example invocation: chmod 755 <file>
2This command-line option is for generating a font-image file that contains User Defined Characters (UDC) that are currently configured on a Windows workstation. The generated font-image file is an ANSI code page based on the workstation locale. The following ANSI code pages are supported: chmod 755 <file>
3The generated font-image file can be used with 5250 printer emulation in combination with a Printer Definition Table (PDT) on a Windows workstation. The command will start a GUI which will allow you to specify the path in which to place the generated font-image file. The generated font-image file needs to have the above specified name and be placed in the Emulator\fonts folder which exists at: chmod 755 <file>
4Where <Configuration Root> is normally a path like: chmod 755 <file>
5To find the actual Configuration Root for your installation, see section 8.1 Configuration Location.Limitations:
9.2 File AssociationsSome configuration files generated by IBM i Access Client Solutions are supported from the command-line when they are provided as the first and only parameter. When these files with specific file extensions are provided as the first parameter, IBM i Access Client Solutions will associate the file with the function to be invoked and provide the file as input to that function. The following extensions have file association support: chmod 755 <file>
6Command-line examples: chmod 755 <file>
7...where acslaunch_xxx is the command-line syntax used for starting the product. See section 7.3 Starting the Product (using the command-line).These supported command-line file associations enable the user to manually set up operating system (OS) specific file associations. Since file associations are platform dependent, the steps required depend on the OS. The reason you may want to consider setting up file associations for your OS is so you have the ability to double-click a file (of one of the above supported file types) to start the designated function.The following sections provide some examples of setting up file associations for some operating systems. 9.2.1 File Associations (for Windows)
The appropriate IBM i Access Client Solution function will now run when you double-click files with this type. 9.2.1.1 Change Icon (for Windows Shortcut)
9.2.2 Setting up a Desktop Icon (for Linux)Follow the steps in the QuickStartGuide for Linux. This will install the application to /opt/ibm/iAccessClientSolutions. It will also create: /usr/share/applications/IBM i Access Client Solutions.desktop To create an icon for the product on your desktop, copy the above .desktop file to your Desktop folder. You may need to adjust the permissions of file on your desktop so that it is executable. 9.2.2.1 File Associations (for Linux)The steps required for setting file associations will depend on the Linux distribution and the desktop environment being used. In general, the steps required are similar to the above steps used for Windows.
9.2.3 File Associations (for Mac)In order to use File Associations on a Mac, the file type must be associated with an application. Follow the steps in the QuickStartGuide for Mac so IBM i Access Client Solutions is an installed application. 9.2.3.1 Create File Associations (for Mac)
The appropriate IBM i Access Client Solution function will now run when you double-click files with this type. 9.2.3.2 Change Icon (for Mac)Use the Preview application to locate the Icons folder within the product directory and use Finder to replace the icon in Get Info.
9.3 Changing Configuration LocationBy default, each user will have their own unique location for their configuration. The configuration location can be changed by setting the property: The AcsConfig.properties file exists in two locations when the product is shipped. It is contained inside the acsbundle.jar file. For convenience, it is also provided in the product .zip file and is in the same directory as the acsbundle.jar file when the .zip file is unpacked. During start-up, the product will only use the first AcsConfig.properties file it finds. It first checks the directory where the acsbundle.jar file exists. If AcsConfig.properties is not found in the same directory as the acsbundle.jar file , it will use the AcsConfig.properties file inside the acsbundle.jar file. You may choose to update AcsConfig.properties in acsbundle.jar with a custom configuration path. If you do, make sure the directory where acsbundle.jar exists does not contain an AcsConfig.properties file or it will get used instead. This provides the flexibility of being able to distribute the configuration location with the acsbundle.jar file while also providing the flexibility to override it. Special keywords are provided which can be used when defining the configuration path. When the keywords are used in the specified path, the keywords are substituted with the text or path they define. Only one keyword can be used in the configuration path. The special keywords and their meanings are: chmod 755 <file>
8The following keywords can only be at the beginning of the specified path: chmod 755 <file>
9Technical Note: which java
0There are several problems with multiple users sharing this configuration path:
When sharing a configuration path between multiple users, the {USER} keyword should be used to avoid collisions with other users. It is substituted with the user ID of the current user. When setting the configuration path, use a forward slash ('/') instead of a backward slash ('\') as the directory separator. This works on all operating systems including Windows. Here are some recommended sample configurations: Example 1 - local configuration for current user (default): which java
1When AcsBaseDirectory is not set, the configuration defaults to a platform dependent path for the user. This is the default setting for IBM i Access Client Solutions.Example 2 - remote (or local) configuration unique for each user: which java
2The configuration is remote or local based on the location of {ROOT}.Example 3 - remote (or local) configuration unique for each user: which java
3The configuration is remote or local based on the location of {PRODUCTDIR}.Example 4 - local configuration on portable media (like USB drive): which java
4Since the path to the portable media will vary depending on the system where it is being used, this setting allows the configuration to be relative to the product files. In this example, the {USER} keyword was intentionally not specified so the configuration on the USB drive would be used by the user of the USB drive, regardless of the user ID.9.4 Other Deployment OptionsHere are some other deployment options you may want to consider:
9.4.1 Automatically import configuration settingsThe following properties may be used in the AcsConfig.properties file to automatically set up a configuration for new users or to update a configuration for existing users: which java
5Here are the necessary steps:
Here is how it works: The path for the com.ibm.iaccess.autoimport property may be specified as an absolute path, a URL or with keywords defined in section 9.3. For example: which java
6Additional flexibility is provided by allowing the configuration file to be distributed within acsbundle.jar or in the same directory as acsbundle.jar. For either case, set com.ibm.iaccess.autoimport with the name of the file without a preceding path: which java
7A special value of * is allowed for com.ibm.iaccess.autoimport.version: which java
8This will always import the configuration regardless of any previous version. Note: which java
99.4.2 Native IBM i DeploymentsSome of the command-line plug-ins that do not require a GUI can be used natively on the IBM i. For example, you can use Data Transfer to extract data from your database into a spreadsheet file type directly on the IBM i without downloading the data to the PC. To do this, you can extract the product .zip file to any place in the IBM i Integrated File System (IFS). For example, if you extracted the product .zip file to: ls -l <file>
0And you have a previously saved Data Transfer download request that exists at: ls -l <file>
1You can run the following command on the IBM i: ls -l <file>
2Note: 9.5 Customized PackagesIBM i Access Client Solutions provides system administrators the ability to restrict the usage of specific functions by setting either of the following two properties in the AcsConfig.properties file: ls -l <file>
3Setting com.ibm.iaccess.ExcludeComps will disable the specified functions. All other functions are enabled. Any function specified on this property will not be available from the main ACS GUI nor from the command line. The functions which may be specified on this property are listed below. Setting com.ibm.iaccess.IncludeComps will enable the specified functions. All other functions are disabled. Any function specified on this property is available for normal usage. The functions which may be specified on this property are listed below. ls -l <file>
4Functions may also be specified as groups using the following keywords: chmod <permission> <file> 7Normally these properties would not be used together. If they are used together and a function is specified on both properties, the function is disabled. Example 1: This will disable all the functions associated with OPCONSOLE,HWCONSOLE,L1CPLUGIN. All other functions in the above list are enabled. ls -l <file>
6Example 2: This will enable 5250 and data transfer downloads. All other functions in the above list are disabled. ls -l <file>
7If the system administrator would like to update the AcsConfig.properties file inside acsbundle.jar before deploying it to their users, an example of how to do that is: ls -l <file>
8Refer to section 9.3 Changing Configuration Location for additional information about how IBM i Access Client Solutions determines which AcsConfig.properties file to use. *footnote - "Hardware Management Interface 1" and "Hardware Management Interface 2" may be renamed by setting properties com.ibm.iaccess.HMI1 and com.ibm.iaccess.HMI2 in AcsConfig.properties. 9.6 Migrating from IBM i Access for WindowsIBM i Access Client Solutions configuration files are not compatible with the corresponding functions in IBM i Access for Windows. IBM i Access Client Solutions provides a migration path for several key items as discussed in the following sections. 9.6.1 Migrating System ConfigurationsThe Copy Connections function available from the main GUI menu at File->Copy Connections provides an interface for copying system configurations between IBM i Access Client Solutions and the legacy Windows configuration supported by IBM i Access for Windows. For additional information, see the help for the main panel of Copy Connections. The system configurations may also be migrated using the command line. See section 9.1.25 MIGRATE for additional information. 9.6.2 Migrating 5250 Emulation5250 emulation files used by the IBM i Access for Windows Personal Communications emulator can be converted by using the 5250 Session Manager in IBM i Access Client Solutions. The following file types can be converted from Personal Communications: ls -l <file>
9The files are converted to: java -Xmx1024m -jar <path>/acsbundle.jar
0The .kmp, .pmp, and .bar file types are used by both products. However the formats are not compatible. The converted files are created in an IBM i Access Client Solutions specific path.The conversion of these files can be initiated from the IBM i Access Client Solutions Session Manager menu by:
A macro conversion utility is available. From the Session Manager: java -Xmx1024m -jar <path>/acsbundle.jar
1Technical Note:The macro conversion utility may not be able to convert a PC5250 macro if the macro is a custom macro that contains more than just recorded key strokes. 9.6.3 Migrating Saved Data Transfer Request FilesData Transfer in IBM i Access Client Solutions provides a wizard for converting saved Data Transfer request files that were generated by IBM i Access for Windows. The following file types can be converted from IBM i Access for Windows: java -Xmx1024m -jar <path>/acsbundle.jar
2The files are converted to: java -Xmx1024m -jar <path>/acsbundle.jar
3The Data Transfer migration wizard does not migrate .fdf files. The new file type required by IBM i Access Client Solutions is of the type .fdfx and can be generated during a download or by using the Create File Wizard.The Data Transfer migration wizard is available from the Data Transfer main menu by selecting Actions->Data Transfer Migration 9.6.4 EHLLAPIFor 5250 applications which leverage EHLLAPI when accessing the Personal Communications emulator shipped with IBM i Access for Windows, refer to the following KB article for information about using EHLLAPI with IBM i Access Client Solutions: java -Xmx1024m -jar <path>/acsbundle.jar
49.6.5 KerberosIBM i Access Client Solutions has support for Kerberos. To use Kerberos when connecting to a system:
9.6.6 5250 CompatibilityThe property com.ibm.iaccess.PC5250Compatibility can be used to change the default behavior for the ACS emulator. This property can be set in AcsConfig.properties with the following values: java -Xmx1024m -jar <path>/acsbundle.jar
5Example 1: java -Xmx1024m -jar <path>/acsbundle.jar
6Example 2: Multiple values can be specified in a comma separated list. java -Xmx1024m -jar <path>/acsbundle.jar
79.7 Key ManagementManaging certificates for Secure Socket Layer (SSL) connections is available from the main GUI by selecting Tools->Key Management. Some tasks on the Key Database require the keystore integrity passphrase. 9.8 Data Transfer9.8.1 Data Transfer Support for Excel and Calc SpreadsheetsIn addition to supporting downloads to a File, Data Transfer also supports downloads to an active spreadsheet for either Microsoft's Excel spreadsheet or OpenOffice's Calc spreadsheet. To download to an active spreadsheet, the main Data Transfer GUI panel provides the option to select an Output Device. By default, the Output Device is File. If your platform supports interaction with the Excel and/or Calc spreadsheet, additional options for an Active Excel Spreadsheet and an Active Calc Spreadsheet can be selected from the Output Device drop down box. Restrictions:
9.8.2 Data Transfer Support for Character Truncation and Numeric OverflowDuring a Data Transfer upload request, if a character or numeric field exceeds the defined size of the field, the upload request will terminate. To enable character fields to be truncated from the end, set the following property in the AcsConfig.properties file: To enable numeric fields to be set to their maximum positive or negative value when the provided numeric field exceeds the defined boundary, set the following property in the AcsConfig.properties file: When these properties are set to true, the upload request will continue without providing any indication that truncation or overflow occurred. Character fields are truncated at the end. Numeric fields are set to their maximum value for overflow and their minimum value for underflow. Alternatively, the above properties can be set from from the command line like other Java properties as follows: 9.8.3 Data Transfer Sheet NameDuring downloads, a sheet name is generated based on the name of the IBM i source library and file with ">Sheet#" appended where # is replaced with the appropriate sheet number. For example: To override the library and file portion of the sheet name, you may specify the following property: If the special values of %1$s %2$s or %3$s are used in the property, the placement of library.filename and sheet# can be changed or eliminated. The values have the following meaning: Using any of these special values provides complete control of the sheet name. Setting the property to Sheet%2$s will produce sheet names: Sheet1, Sheet2, etc You may use %1$s %2$s or %3$s in any combination with other text. Note: 9.9 Establishing a Console Connection to IBM iTo perform administrative functions on the IBM i, a 5250 console is required. IBM i Access Client Solutions supports both LAN and HMC console configurations. If you know the Service host name or Service IP address for your IBM i or the host name or IP address for your HMC console, you can configure the console information within IBM i Access Client Solutions using the following steps:
For an IBM i where the console configuration does not yet exist (e.g. a new system just delivered to your business), an IP address for a console connection is automatically assigned in the range of 169.254.62.0 - 169.254.62.63 during the IPL. For these cases, the following steps will help establish a console connection using IBM i Access Client Solutions:
When you are ready to add the IBM i system to the rest of your network infrastructure, there is additional information in the IBM Knowledge Center for how to configure the Service Tools LAN adapter: See Configuring the service tools server for DST. For IBM i systems that already have a LAN console configuration and are already in your network infrastructure, the following steps may be used to find existing console configurations:
9.10 Additional FontsAdditional fonts for 5250 emulation may be added to the Fonts directory. To provide alternative and/or multiple locations for additional fonts, set the com.ibm.iaccess.Fonts property located in the AcsConfig.properties file. The default Fonts directory may be overridden by setting the com.ibm.iaccess.Fonts property to a:
Note: Example 1 (default): java -Xmx1024m -jar <path>/acsbundle.jar
8Example 2: java -Xmx1024m -jar <path>/acsbundle.jar
99.11 Using Credentials from a netrc FileTo enable the usage of a .netrc file (Linux and Mac) or a _netrc file (Windows), go to the IBM i Access Client Solutions main GUI and from the menu bar, select The standard format of a netrc file is: Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
00The netrc file must be stored in the user's home directory and the system name and user-id must match System Configurations. From IBM i Access Client Solutions: When the system name and Default user name match the contents of the netrc file, a connection to the system is made using the password from the netrc file without prompting the user. 9.12 Integrated File System (IFS)9.12.1 IFS, QFileSvr.400, and SecurityThe Integrated File System Support uses the QFileSvr.400 file system to copy or send objects from one IBM i partition to another. This means the user profile and password on both partitions must match, and the partitions must have the same password level system value (QPWDLVL). If using Kerberos authentication, both partitions must have Network Authentication Service and Enterprise Identity Mapping (EIM) configured. For more details, see IBM i file server file system (QFileSvr.400). By default, the connections to other IBM i partitions made by the QFileSvr.400 file system are not secure. There are two options for configuring a secure connection: Option 1: Option 2: 9.12.2 IFS AuthorityThe Integrated File System support requires authority to use the following CL commands: Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
01If the user cannot use these CL commands, the Copy, Paste, Send, Delete, and New Folder actions will fail. 9.12.3 IFS LimitationsThe Integrated File System support does not allow actions for objects which have paths that start with /QFileSvr.400, /QNTC, or /QOPT. If the current directory path or any selected object path starts with /QFileSvr.400, /QNTC, or /QOPT, all items in the Actions menu are disabled and a context menu will not be displayed. 9.12.4 IFS and Independent ASPsThe Integrated File System support does not allow the Copy, Paste, or Send action when the source object or target path is located on an independent ASP. 9.12.5 IFS PerformancePerformance of IFS when displaying the contents of a directory is determined by the column attributes selected (View->Columns...) and whether the directory contains symbolic links. For non-symbolic links, there is an additional performance impact when selecting either CCSID or Owner. For symbolic links, there is an additional performance impact for each column attribute selected other than Icon, Name, and Size (KB) When displaying a directory with a large number of entries, you may exceed the default memory limit of the Java Virtual Machine (JVM) where IBM i Access Client Solutions is running. This can cause all open windows to slow down and eventually stop responding. If you are displaying directories with a large number of entries, consider using the Include filter to limit the number of entries sent from the server. Or, start the product using the -Xmx option to increase the available memory. For example: Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
02The above examples will change the JVM memory to 4 gigabytes. You may need to increase the size even more based on the number of entries in the directory. 9.13 Secure Shell (SSH) TerminalFor platforms where a Secure Shell exists by default or has been installed, the SSH Terminal feature will appear on the IBM i Access Client Solutions main GUI. SSH Terminal will launch a terminal emulator to the IBM i Integrated File System. Most Mac, Linux, and other UNIX-derived systems already have a Secure Shell by default. For these platforms, it is assumed an OpenSSH client exists and is located at /usr/bin/ssh. Windows users will need to install one of the Secure Shells available for Windows. Secure Shells supported by IBM i Access Client Solutions: Linux: Xterm, XterminalEmulator, MateTerminal, Terminator, GnomeTerminal, Konsole, Xfce4 If there are multiple SSH applications installed, you can use the com.ibm.iaccess.PreferredSSHClient property to set the preferred SSH client. Linux examples: Mac examples: Windows examples: For cases when the SSH client is not installed to the standard location, you can use the com.ibm.iaccess.PreferredSSHClient property to provide the fully-qualified path to the installed SSH client. com.ibm.iaccess.PreferredSSHClient=C:\PuTTY\putty.exe When the fully-qualified path is provided, you may also need to set com.ibm.iaccess.SSHClientOpt to provide all necessary arguments. For example, to disable warnings if you don't use X11 forwarding: com.ibm.iaccess.SSHClientOpts=-x 9.13.1 SSH Terminal PrerequisitesInstall 5733-SC1 IBM Portable Utilities for i on the IBM i.Start the Secure Shell Daemon using the command: STRTCPSVR *SSHD If you receive a connection error within the launched SSH client (for example, "connection refused"), or if a window pops up but immediately vanishes, you may need to start the SSH daemon with the above command. 10.0 Service DiagnosticsIf you encounter a problem which requires IBM service, your IBM service representative may direct you to do one or both of the following: From the main IBM i Access Client Solutions GUI:
11.0 Frequently Asked Questions (FAQ) Windows_Application\install_acs_64.js /AdminConfig
Windows_Application\install_acs_64.js /Q
0312.0 Update HistorySee the following web page: [{"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SSB2FY","label":"IBM i Access Family"},"Component":"","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"All Versions","Edition":"","Line of Business":{"code":"LOB57","label":"Power"}}] Which of the following are options for recurrence of Maintenance Windows?From the Maintenance type list, select Planned or Unplanned. Use the fields provided to define a recurrence schedule (one-time, daily, weekly, or monthly), the recurrence timeframe, and the time zone.
What is maintenance window and how can we use it?Maintenance windows help make sure that client configuration changes occur during times that don't affect productivity. With Software Center, users can see the device's next maintenance window on the Installation status tab. The following tasks support maintenance windows: Application and package deployments.
What is the maintenance window in corporate production environment?A Maintenance Window is a regularly recurring event during which planned outages and changes to production environments and software may occur (except during change restriction dates).
How to create operating system image in SCCM?Create SCCM Windows 10 Build and Capture Task Sequence. Open the SCCM Console.. Go to Software Library \ Operating Systems \ Task Sequences.. Right-click Task Sequences and select Build and capture a reference operating system image.. |