Chapter 2. Integrating HATS with business applications 159
1. As shown in Figure 2-89, select the User List tab. In the User List pane, click
the Add button.
2. In the Add User Profile window (Figure 2-89), provide the valid values for your
system and click OK. In this VT example, we define an AIX system using he
following values:
User ID: root
Description: usuario1
Password: ********
Confirm Password: ********
Figure 2-89 User List
3. Press Ctrl+S to save and close the window.
2.4.3 VT macro
In this section, we create a new macro for the VT application. Since the creation
of the macro is the same in any type of emulation, we add a basic example to join
with the User List feature. For more information about how to use macros, see
2.2.3, “Using macros in an OS/400 environment” on page 101.
160 Using IBM WebSphere Host Access Transformation Services V5
1. To create the macro, open a host terminal. Select project
name
Connections vt. Right-click vt and select Open Terminal vt.
See Figure 2-90.
Figure 2-90 Opening the terminal for VT
2. The AIX welcome window (Figure 2-91) opens. This indicates that the VT
connection is working.
Figure 2-91 AIX welcome window
3. On the Host Terminal (Figure 2-92), click the Record Macro button.
Figure 2-92 Starting the macro
4. In the window that opens, you are asked for a macro name. Complete the
name request with some value and leave the other fields as default. We use
macro_list as the macro name. Click Finish.
5. Define the recognition criteria for the current page. Leave the default values
and click Next.
6. Click Finish.
Chapter 2. Integrating HATS with business applications 161
We now begin to record the macro:
1. Click the Add Prompt Action icon.
2. In the Add Prompt Action window (Figure 2-93), define an action. In this case,
we use User List:
a. In the Handle Macro Prompt box, select the Set prompt to property from
User List option. From the User Profile list, select the name of your user
(in this example, root). For User List property, select _userid.
b. The macro requests a User List to complete the correct value for _userid.
Click OK.
c. Press Enter.
Figure 2-93 User list property _userid
162 Using IBM WebSphere Host Access Transformation Services V5
3. Pass the User List password value using User List options. Click the Add
Prompt Action icon.
4. In the Add Prompt Action window (Figure 2-94), define an action. Again we
use User List.
a. In the Handle Macro Prompt section, select the Set prompt to property
from User List option.
b. From the User Profile list, select the name of your user (in this example
root).
c. From the User List property list, select _password.
d. The macro requests a User List to complete the correct value for
password. Click OK.
e. Press Enter.
Figure 2-94 User list property _password
Chapter 2. Integrating HATS with business applications 163
5. Select a result that shows in a result page. Using your mouse pointer, select
the area that you want to use as a result.
6. Click the Add Extract Action icon. For this example, we use the welcome
window (Figure 2-95) presented by AIX after the user completed the user
name and password.
7. Define the recognition criteria for the current page. Leave the default values
and click Next.
Figure 2-95 Result page
8. Click Finish.

Get Using IBM WebSphere Host Access Transformation Services V5 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.