IBM i Access for Windows Toolkit

Communications and security

The following sample programs are available to help develop applications using the IBM i Access for Windows communications and security APIs:

ActiveX automation objects and controls

  • - d_allobj.exe – Delphi 4 sample using the IBM i Access for Windows automation objects.

    This Delphi 4 sample uses the IBM i Access for Windows automation objects to perform the following:

  • - dqrmtcm2.exe – Sample using ActiveX controls and automation objects for data queues and remote command.

    This Visual Basic sample uses the IBM i Access for Windows ActiveX custom controls and automation objects to retrieve a list of IBM i systems (which have been previously connected), create and delete libraries, create and delete data queues, and send and receive data using data queues.

  • - vballobj.exe – Visual Basic sample using the IBM i Access for Windows automation objects.

    This Visual Basic sample uses the IBM i Access for Windows automation objects to perform the following:

  • - vbsallob.exe – Visual Basic Script sample using the IBM i Access for Windows automation objects.

    This Visual Basic Script sample uses the IBM i Access for Windows automation objects to perform the following:

    This sample requires the file cwbxvbs.inc which is installed in the Include directory as part of the IBM i Access for Windows Toolkit. This file must be in the same directory as the files from this sample.

    Note: If you get the following error while running this script:
    "ActiveX component can't create object: 'createobject'"
    please see Microsoft Knowledge Base article Q195826.

C/C++ APIs

  • - coconsce.exe – Use of Communications System Object APIs in various connection scenarios.

    This sample demonstrates how an application might use the IBM i Access for Windows Communication APIs related to System Objects. In this example, these APIs are used to create system objects and to set their attributes according to the security and performance requirements of various scenarios. The system objects are then used to run remote commands (using the Remote Command APIs and Service APIs) and to validate user IDs and passwords, and the behavior and some elapsed times can be observed by the user.

  • - cogetsys.exe – Demonstrates the use of Communications APIs.

    This module is used to demonstrate how an application might use the Communication APIs. In this example, these APIs are used to get and display the list of all configured systems. The user can choose either to be shown all of a system's connection properties (the attributes of the created system object), or to have the ability to connect to all IBM i Access for Windows systems checked. APIs that deal with the System List as well as APIs that deal with individual System Objects are used.

Contact IBM

  • Call IBM Support Line:
    1-800-IBM-SERV (1-800-426-7378)1-800-426-7378
    Inside the US

IBM Power Systems deliver flexibility and choice of operating systems to enable your business to support the next generation applications for big data and analytics and cognitive computing that are transforming how organizations work today. Whether running 1, 2, or all 3 - coupled with PowerVM, they maximize the benefit of Power Systems in your business.

Transform your business with Systems Software that enables virtualization, high availability, flexibility, security and compliance on Power Systems™. IBM’s integrated approach to developing Systems and Systems Software together delivers optimized results with Power Systems.

As an open innovation platform, Power Systems is optimized for big data and analytics performance and to deliver scale-out economics and security for the cloud. IBM and IBM Business Partner solutions exploit key capabilities in IBM Power Systems.

Over the last five years thousands of clients have migrated to IBM Power Systems for choice and flexibility. Learn how Power Systems has helped them revolutionise the way IT is developed and delivered, optimise for big data and analytics, and support private, public and hybrid offerings for scale-out or scale-up implementations all while improving business performance, reducing risk, and establishing a platform for growth.

Additional information