KeyesMail Manual
KeyesMail Manual
1
Limited Use License Agreement
License
You may use the programs on a single machine and copy the programs into any
machine readable or printed form for backup purposes in support of your use of
the programs on the single machine.
You may not use, copy, modify, sub license, assign, or transfer the programs in
whole or in part to another party.
Term
This license is effective until terminated. You agree upon such termination to
destroy the programs together with all copies.
Warranty
The programs are provided with a 90 day no bug guarantee: If you find that
KeyesMail does not perform a function as it is described in the user's guide,
during the first 90 days after purchase, Computer Keyes will correct the problem
at no charge.
Computer Keyes does not warrant that the functions contained in the programs
will meet your requirements or that the programs are fit for a particular purpose.
Limitation of Remedies
Computer Keyes's entire liability and your exclusive remedy shall be the
replacement of defective materials or workmanship, during the first 90 days.
In no event will Computer Keyes be liable to you for any damages, including any
lost profits, lost savings, or other incidental damages arising out of the use or
inability to use the programs.
2
Table of Contents
Table of Contents
1 Introduction 11
Installing KeyesMail.................................................................. 12
Sign on as a Security Officer............................................................ 12
New Installation................................................................................ 12
Updating an Existing System............................................................ 12
Copying KeyesMail Programs to a New Library................................ 13
Ending the System and Backing Up the Libraries............................ 13
Run the KeyesMail Update Program................................................ 14
Install the KeyesMail Data library..................................................... 14
Enter your KeyesMail License number............................................. 15
Change your Library List to include the KeyesMail libraries..............16
Create the KeyesMail Subsystem.................................................... 16
Create a KeyesMail Communication line.......................................... 17
Connect a Modem to your iSeries.................................................... 17
Obtain ISP Connection Information.................................................. 18
Define a Connection to a Mail Server............................................... 19
Create a Connection Script for each ISP.......................................... 22
Work with Point-to-Point TCP/IP Modem Information...................... 23
Defining a SLIP Connection Profile.................................................. 23
Defining a PPP Connection Profile................................................... 25
Check a Dial-up Connection............................................................. 26
KeyesMail Communication....................................................... 28
Starting and Stopping Mail Runs...................................................... 28
Working with KeyesMail Connections.............................................. 28
Options............................................................................................. 29
Function Keys.................................................................................. 29
Adding User Mailboxes............................................................. 30
User Setup Screens.................................................................. 31
Authorization Lists............................................................................ 35
Routing Entries................................................................................. 36
Naming Conventions........................................................................ 36
KeyesMail Servers..................................................................... 37
Starting and Stopping the Servers.................................................... 37
Working with KeyesMail Servers...................................................... 37
Options............................................................................................. 38
Function Keys.................................................................................. 38
KeyesMail Server Setup................................................................... 39
External Mailboxes.................................................................... 40
Address Lists............................................................................. 41
Editing an Address List..................................................................... 42
Using PC Mail Clients............................................................... 43
Using a Web Browser............................................................... 44
3
Table of Contents
2 Tutorial 45
Creating and Editing an E-mail Message................................ 46
Addressing your E-mail.................................................................... 47
Keying the Message......................................................................... 47
Inserting Text................................................................................... 48
Spell Checking................................................................................. 49
Copying Lines.................................................................................. 50
Editing and Adjusting Text................................................................ 51
Deleting Lines.................................................................................. 51
Sending your E-mail......................................................................... 51
KeyesFile Information Manager............................................... 52
Switching Members.......................................................................... 53
Managing Information...................................................................... 53
Changing the Index.......................................................................... 54
Editing a Card.................................................................................. 55
Sending E-mail from your Phonebook.................................... 57
Updating the Phonebook from your Mail................................ 58
Addressing your Mail using the Phonebook........................... 59
Sending Attachments with your Mail....................................... 61
Saving Attachments from your Mail........................................ 63
Displaying Attachments.................................................................... 65
3 KeyesMail 67
Cursor positioning............................................................................ 67
Subject column................................................................................ 67
Status column.................................................................................. 68
To/From column............................................................................... 69
Size column...................................................................................... 69
PSAN column................................................................................... 69
Date column..................................................................................... 69
Category>........................................................................................ 70
By:.................................................................................................... 70
Mailbox>........................................................................................... 71
Position to:....................................................................................... 71
Options............................................................................................. 72
User Defined Options....................................................................... 74
Function keys................................................................................... 75
E-mail Security................................................................................. 75
4 Message Editor 77
Launching E-mail from KeyesFile..................................................... 77
The Message Editor Screen...................................................... 78
Getting Help..................................................................................... 78
Hot Spots......................................................................................... 78
Function keys................................................................................... 79
The Message Editor Fields....................................................... 80
4
Table of Contents
Sent:................................................................................................. 80
From:............................................................................................... 80
To>................................................................................................... 80
Subject:............................................................................................ 81
Attach>............................................................................................. 81
Options>........................................................................................... 81
Status:.............................................................................................. 82
Errors:.............................................................................................. 82
Message:......................................................................................... 82
F1=Functions>................................................................................. 82
Editing the Message Text......................................................... 84
Copying Lines of Text....................................................................... 84
Spell Checking................................................................................. 85
Attachments (Inbound)............................................................. 87
Option 1=Save attachment as.......................................................... 87
Option 4=Remove............................................................................ 89
Option 5=Display.............................................................................. 89
Uncompression & Unencryption....................................................... 90
Attachments (Outbound).......................................................... 91
Option 1=Save attachment as.......................................................... 91
Option 2=Change............................................................................. 91
Option 4=Remove............................................................................ 91
Option 5=Display.............................................................................. 91
Defining new Attachments....................................................... 92
Type 1 (PC/Text) or Type 2 (PC/Binary)........................................... 92
Type 3 (PF) or Type 4 (SrcPF)......................................................... 93
Type 5 (SplF)................................................................................... 93
Type 6 (SavF).................................................................................. 95
Compression & Encryption............................................................... 96
5 PhoneBook 97
Starting and Stopping the Phonebook.............................................. 97
KeyesFile's Screen.................................................................... 98
Getting Help............................................................................... 99
Adding and Filling In Cards.................................................... 100
Adding Lines to a Card................................................................... 100
Moving Through Your Cards.................................................. 101
Scrolling through Your Cards......................................................... 101
Displaying a Subsetted List of Cards.............................................. 102
Cancelling a Subsetted List............................................................ 102
Searching for Text in Cards............................................................ 103
Editing Text on Cards............................................................. 104
Scrolling Through a Card............................................................... 104
Inserting a Line in a Card............................................................... 104
Deleting a Line from a Card........................................................... 104
Copying Text to Another Line or Card............................................ 105
Undoing Changes.......................................................................... 105
Using Card Headings.............................................................. 106
Editing Card Headings................................................................... 106
Deleting a Card........................................................................ 107
Duplicating a Card................................................................... 108
5
Table of Contents
6 API's 119
Application Program Interfaces (API's)........................................... 119
Change KeyesMail Password (CHGKMLPWD)...................... 120
Mailbox (MAILBOX)....................................................................... 120
Password (PASSWORD)............................................................... 120
Create a KeyesMail Message (CRTKMMSG)......................... 121
Mailbox (MAILBOX)....................................................................... 121
Recipient's name (NAME).............................................................. 121
Recipient's address (ADDRESS)................................................... 121
Edit a KeyesMail Message (EDTKMMSG).............................. 122
Mailbox (MAILBOX)....................................................................... 122
Mail member (MAILMBR)............................................................... 122
Recipient's name (NAME).............................................................. 122
Recipient's address (ADDRESS)................................................... 122
Returned messages (MESSAGE).................................................. 122
Mail Automatic Reply from a Template (KMLAUTORPY)..... 123
Mail member template (MAILMBR)................................................ 123
To E-mail address (TOADDR)....................................................... 123
Subject (SUBJECT)....................................................................... 123
Change the Status of a Mail Member (KMLCHGSTS)........... 124
Mail member name (MAILMBR)..................................................... 124
New status (NEWSTATUS)........................................................... 124
Mail a PC File as an Attachment (KMLPCFA)........................ 125
Mail member or template name (MAILMBR).................................. 125
To E-mail address (TOADDR)....................................................... 125
Subject (SUBJECT)....................................................................... 125
From E-mail address (FROMADDR).............................................. 125
PC File name (FILENAME)............................................................ 126
Folder (FOLDER)........................................................................... 126
Description (DESC)........................................................................ 126
Translation code (TRANSLATE).................................................... 126
Attachment number (ANUMBER)................................................... 126
Compress attachment (COMPRESS)............................................ 126
6
Table of Contents
7
Table of Contents
8
Table of Contents
Appendix 171
Rules for Creating Connection Scripts........................................... 171
Connection Script Example............................................................ 172
Granting Authority to Start the KeyesMail System............... 173
International Character Set..................................................... 174
Restoring an iSeries or AS/400 Save File.............................. 175
Mapping a Spooled File to an Overlay................................... 176
Creating a Rich Text Overlay (Deprecated).................................... 176
Mapping existing Printer Data........................................................ 178
Creating Custom Printer Data........................................................ 180
The Resulting Mapped Document.................................................. 182
How to Create a Template...................................................... 183
Debugging an Exit Program................................................... 184
Automatic Blind Copies.......................................................... 185
Setting up Auto Blind Copies.......................................................... 185
9
Table of Contents
Index 189
10
1 Introduction
1 Introduction
KeyesMail is a full function E-mail package for the iSeries. You can use it to
automatically generate outbound e-mail messages, with attachments. This can be
accomplished using API's or by placing spooled files in an output queue that it
monitors. It can also serve as an interactive e-mail client for 5250 terminals or
PC's.
It allows iSeries 5250 terminals to send and receive full Internet e-mail, with
attachments. KeyesMail contains two different mail servers allowing PC's to use
any POP3 mail client software (Outlook and Eudora are examples), or any Web
browser (Internet Explorer, Firefox and Netscape are examples) to access mail.
KeyesMail can connect to your existing network mail server, or to an Internet
Service Provider (ISP) using a direct or a dial-up connection. Security will not
be compromised. KeyesMail will not start any of the TCP/IP Application
servers. KeyesMail is immune to e-mail viruses and hackers cannot gain access
to your iSeries through the KeyesMail software.
You can retrieve e-mail from more than one ISP or Network and can have
multiple individual accounts or multi-user domain accounts for each connection.
You decide how often the system will contact each host. All incoming messages
are automatically routed to the appropriate mailboxes, that you configure.
The software comes complete with a text editor for creating, editing, and
viewing e-mail messages on iSeries terminals. The editor is very easy to learn
and use. It includes automatic word wrapping within paragraphs, inserting,
deleting, and copying text. It also has a spell checker and a phone book for
saving and retrieving e-mail addresses.
KeyesMail is SMTP/MIME compliant which allows multiple attachments to be
sent and received with your messages. Any iSeries object can be exchanged as
an attachment, including physical files, source files, spool files, program objects,
save files, and any files located in the Shared Folders.
The recipients of the iSeries objects can be on any kind of computer. They do
not have to have an iSeries or AS/400 and they do not have to have KeyesMail
software. The data will be translated between EBCDIC and ASCII, as
appropriate.
Any type of spooled file can be sent as is, so that it can be restored as a spool file
on another iSeries or AS/400 computer. Spool files can also be translated into
ASCII text, Rich Text, PDF files, or mapped onto a forms overlay to be
displayed or printed by PC's. PCL and AFPDS Spool files can also be translated
into TIFF Images or PDF files.
Physical files can be sent as is or translated into ASCII text or CSV (Comma
Separated Values) files that are easily imported into Excel or other Spread
Sheets.
KeyesMail can create encrypted PDF's, if you supply user and/or owner
passwords. If you purchase PKZIP software, for your iSeries, KeyesMail can
use this to compress and optionally password encrypt any type of attachment.
11
1 Introduction
Installing KeyesMail
New Installation
If this is the first installation of the KeyesMail system it will take several steps to
complete. Please follow the instructions on the following pages to complete the
installation outlined below.
12
1 Introduction
Restoring Instructions:
1. If you have a CD or tape load it into the appropriate drive.
2. Restore the programs from the CD, tape, or the Save File from the Web.
New Installation:
Enter: RSTLIB SAVLIB(KM08LIB) DEV(device)
MBROPT(*ALL) RSTLIB(KMLIB)
Updating an Existing System:
Enter: DLTLIB LIB(KMUPD)
Ignore any "Library not found" message.
Enter: RSTLIB SAVLIB(KM08LIB) DEV(device)
MBROPT(*ALL) RSTLIB(KMUPD)
device is the name of the CD drive (usually OPT01) or enter *SAVF if
you are restoring from a Save File. The name of the Save File should
be KM08SVF in QGPL.
13
1 Introduction
14
1 Introduction
15
1 Introduction
16
1 Introduction
17
1 Introduction
Internet Addresses
Smaller ISP's may use the same address for logging on, the POP3 server, the
SMTP server, and the DNS server. Larger ISP's usually use different servers for
each function.
Addresses must be in a dotted decimal format (XXX.XXX.XX.X). Server
names are quite often called "mail." in front of the ISP's domain name. For
example "mail.domain-name.net". Or sometimes they will be named separately,
such as "smtp.domain-name.net" and "pop3.domain-name.net".
It is possible to Sign-on to the Internet using a connection on one ISP, and
download your E-mail from a POP3 server run by a different ISP. You simply
have to code the server addresses, account names, and passwords, appropriately.
18
1 Introduction
Defining a Connection
1. Be sure that the KeyesMail Program and Data libraries are on your library
list, as described on a previous page.
2. Display the KeyesMail Menu.
Enter: GO KMMENU
3. Start item 21 Work with KeyesMail Connections.
4. Use option 3 to copy an existing connection to the new number. If no
connections exist use F6 to create a new one.
5. Use option 2 to define the new connection information. The Help key may
be used to get additional information about each parameter.
Sample connections are shown on the following pages.
19
1 Introduction
20
1 Introduction
21
1 Introduction
****************************************************
* KeyesMail Connection Script *
* For iSeries with Dynamic IP Address *
****************************************************
login
& (USERID)
password
& (PASSWORD)
IP address is (IPADDR)
* End of KeyesMail Connection Script
22
1 Introduction
23
1 Introduction
TCP/IP Information:
Protocol type . . . . . . . . . . . . . . . . . . *SLIP
Local interface address . . . . . . . . . . *DYNAMIC (normally *dynamic)
Remote IP address . . . . . . . . . . . . . *DYNAMIC (dotted decimal addr)
Request header compression . . . . . N (N=SLIP, Y=CSLIP)
Maximum transmission unit . . . . . . . 576
Add default route . . . . . . . . . . . . . . . Y
Additional name server . . . . . . . . . . . 165.87.194.244 (DNS server addr)
Modem information:
Use a modem . . . . . . . . . . . . . . . . . Y
Modem information name . . . . . . . . (Use F4 to select a modem)
MultiTech 28800 Multimodem
24
1 Introduction
25
1 Introduction
Starting TCP/IP:
Before the test can be performed, you must start the TCP/IP interface on the
iSeries. Be careful not to start any application servers.
Enter: STRTCP STRSVR(*NO)
26
1 Introduction
27
1 Introduction
KeyesMail Communication
All KeyesMail communication is performed in a KMAIL subsystem. Dial
profiles use one of your communication ports to connect to an ISP. Direct and
network connections use other established communication links to connect to
mail servers. KeyesMail will act as an SMTP and a POP3 mail client to
exchange e-mail with the Internet.
Using Commands:
The commands STRKM and ENDKM can be used to start or stop KeyesMail
Mail Runs, respectively. You may wish to place STRKM in your normal
QSTRUP routine, so that it automatically starts after an IPL. It is also
recommended that you end all Mail Runs before and restart them after doing any
backup of the KeyesMail data library.
Cntn
Opt # STS Current/Previous activity
28
1 Introduction
Options
Option 1=Start
This will start the KeyesMail subsystem, if it was not already active, and then
start a mail run for the selected Connection. If a mail run is already scheduled
for a later time, it will be immediately released.
Option 2=Change
This can be used to change the setup information for each Connection.
Option 3=Copy
This can be used to copy the Connection information to create a new one for
another ISP or network connection.
Option 4=End
This is the normal way to end a mail run that is either active or scheduled.
Option 7=Cancel
This can be used to immediately end a mail run, if it is stuck or not responding
properly.
Option 8=Remove
This can be used to remove a Connection definition when it is no longer needed.
Function Keys
Press this: To do this:
F3 Exit the program.
F5 Update the screen with current activity.
F6 Creates a new Connection for a mail server.
F9 Starts the KeyesMail output queue processing.
F10 Ends the KeyesMail output queue processing.
F12 Cancels the program.
F13 Shows you all the active Jobs in the KMail subsystem.
F14 Shows you all the messages in the KMail MsgQ.
F15 Shows you all the KMail Job Queues.
F20 Shows you the Work with Communication Resources screen.
F21 Shows you the Work with Point-to-Point TCP/IP menu.
F22 Lets you work with Connection Scripts.
29
1 Introduction
Position to:
Options: 2=Setup 3=Copy 4=Delete 5=Authorization List
Bottom
Important! Name each of the user mailboxes the same as their iSeries User-Id.
This is done so that the system can locate the user to notify them when mail
arrives. You may also create mailboxes for groups of users and use the
Authorization List screen to specify users to notify. For example, you can create
a mailbox called SALES and one called ACCOUNTING that multiple users can
access.
Note: You must create a mailbox for POSTMASTER. This is used to hold
inbound mail from a domain mail account that cannot be routed according to
your routing table and outbound mail from applications or users that do not have
their own mailbox to use.
30
1 Introduction
31
1 Introduction
Note: Instructions for setting the fields that a user may change can be found in
the WRKKMUFM source code which is located in QDDSSRC in KMLIB.
Name
The user's full name in upper and lower case. For the Postmaster mailbox, you
can use the Company Name.
Department
This can be used to assist a user in locating someone that works in a particular
area. It can also be used when sending mail to groups of users.
Return address
For convenience, try to set the mail-id to be the same as the iSeries User-Id.
Each user's Return address is their POP3 mail account name (mail-id) added to
the left of your domain name, as shown below:
mail-id@domain.network
You may use different conventions for Internet addresses as you use for the
iSeries User-Id. For example, John Smith might use John for his User-Id, but
use jsmith for his mail-id.
Restrict Attachments
To prevent a user from creating or saving any attachments, code a Y in this field
You may code a P in the field to allow the user Partial access to creating and
saving attachments.
The exact definition of Partial access can be altered by an administrator by
altering the program called CHKKMAS. The original definition allows a user
access to their own output queue, their own QTEMP library, their own shared
folder, and a public folder called EMAIL.
Mail Notification
32
1 Introduction
Use this to define what method that you want to be notified when mail has been
received in your mailbox.
Delivery mode:
Key an N to receive a Normal message in your message queue or key a B to
receive a Break message. Leave this field blank to receive no notification
messages.
Personal Language
Use this field to override the default system language that is entered in the
System Setup. This will be used when spell checking E-mail messages. The
available languages are:
American, British, Danish, French, German, Italian and Spanish
Personal Phonebook
A user should leave these parameters blank, if they wish to use the common
System Phonebook. The System Phonebook is defined in the System Setup.
Auto Forward
Enter a (Y) in this field to cause all inbound mail to be forwarded to another
address. This can be used when a person is temporarily out of the office, or to
define an internal mailbox for a user that is actually located elsewhere.
Forward to address
Used only when you have coded a (Y) in the previous field, you may enter an
Internet address or an address list in this parameter. If you forward to an address
33
1 Introduction
list, you may not exceed 100 recipients and you may not include this mailbox in
any department or address list.
Spam Filter On
Each mailbox can turn On or Off their own spam filter. When the filter is On,
mail that meets the spam criteria will be received into the *Spam category. Mail
in the *Spam category will remain until the Mail purge delay has been reached.
Then the spammed mail will be purged.
You may remove an entry from the *Spam category using the Move option to
move it to a different category. When you move an entry out of *Spam, the
corresponding e-mail address will no longer be considered spam for the current
mailbox.
You may move an entry into the *Spam category using the "S" option in the
Work with KeyesMail screen. After spamming an e-mail entry, the
corresponding e-mail address will be considered spam for the current mailbox.
Signature text
Use these fields to define information about yourself (company, phone numbers,
etc.) that you wish to include with your messages. You may include this text
with any e-mail by positioning the cursor and pressing F16 (Add Signature),
while editing the message.
34
1 Introduction
Authorization Lists
Up to 50 different users may be given access to each internal mailbox, by coding
their iSeries User-Id on this screen. All users that have either an "N" or a "B"
coded after them will be sent either a Normal message or a Break message
telling them when mail has arrived in this mailbox.
In the following example, Bill and John have access to the mail in this mailbox.
John will be sent a Break message when mail arrives.
Authorization List
List all users authorized to access and control E-mail for: SUPPORT
Code (N) to Notify user or (B) to send a Break message.
BILL JOHN B
F3=Exit F12=Cancel
You should not include the owner of a mailbox in their own list. By default, the
owner of a mailbox will be notified of any received mail. In the following
example, Mike has been authorized to access the e-mail in Kris's mailbox.
Authorization List
List all users authorized to access and control E-mail for: KRIS
Code (N) to Notify user or (B) to send a Break message.
MIKE
F3=Exit F12=Cancel
Special Values
*PUBLIC may be used to allow all users to access a mailbox.
*TEMPLATE may be used to allow any API to access a mailbox.
35
1 Introduction
Routing Entries
Routing entries must be included for every internal mailbox. The routing entries
are used to determine which mailbox an Internet address will be sent to.
Each of the entries in the routing table is used to search the name and address of
any mail coming from a company domain account. It is also used to recognize
internal addresses in all outgoing mail.
Routing Entries
The first matching entry that is found will cause the mail to be routed to that
mailbox. If none of the routing entries match the recipient address, the mail will
be routed to the Postmaster mailbox.
Leading spaces can be used in the routing entries to change the order in which
the routing takes place. In the example above, to prevent all of JOHNSON's
mail from being routed to JOHN, a leading space was used. This forces the
routing of JOHNSON's mail to happen before the routing of JOHN's mail.
Naming Conventions
Always create user mailboxes the same as their iSeries User-Id. Use this same
value for the POP3 Mail-Id, if possible. If you wish to use a different
convention for your Internet addresses, then be sure to use the Mail-Id in both
the Return Address and the Routing Entry.
Given: Assign:
User name: John Smith Mailbox: JOHN
iSeries User-Id: JOHN Return address: jsmith@domain
Mail-Id: JSMITH Routing entry: JSMITH
36
1 Introduction
KeyesMail Servers
KeyesMail servers can be used to allow PC's to send and receive mail using a PC
mail client or a Web browser. You do not need to activate the SMTP or POP3
servers if you already have a network mail server. Otherwise, these servers can
eliminate the need for each PC to dial-up the Internet independently. It can also
save you money by eliminating multiple accounts with an ISP, when you have
the ISP define a single domain mail account for your entire company.
Using Commands:
The commands STRKMSRV and ENDKMSRV can be used to start or stop the
KeyesMail Servers, respectively. You may wish to place STRKMSRV in your
normal QSTRUP routine.
F3=Exit F5=Refresh
F12=Cancel F13=KMail Jobs F14=MsgQ F15=JobQ
F17=HTTP Jobs F20=Work w/TCP Administration
37
1 Introduction
Options
Option 1=Start
This will start the KeyesMail subsystem, if it was not already active, and then
start the selected server program. The server program will bind to the
appropriate socket and wait for connection requests from PC mail clients.
Option 2=Change
This can be used to change the server setup information.
Option 4=End
This is the normal way to end a server. No additional connection requests will
be accepted. Any PC that is already connected will continue until normal
completion.
Option 7=Cancel
This can be used to immediately end a server, if it is stuck or not responding
properly.
Function Keys
Press this: To do this:
F3 Exit the program.
F5 Update the screen with current activity.
F12 Cancels the program.
F13 Shows you all the active Jobs in the KMail subsystem.
F14 Shows you all the messages in the KMail MsgQ.
F15 Shows you all the KMail Job Queues.
F17 Shows you all the HTTP Server Jobs.
F20 Shows you the Work with TCP/IP Administration menu.
38
1 Introduction
39
1 Introduction
External Mailboxes
You may define external mailboxes for commonly used recipients. You are not
charged for External mailboxes, so you can create as many as you want. They
can be maintained using item 32 External Mailboxes from the KeyesMail menu.
You may wish to store external Internet addresses in the company Phonebook.
However, you can add addresses as external mailboxes, if desired. Each
mailbox can be coded with either a department or a company name, as you see
fit. Private addresses are stored in a separate file, one for each Internal mailbox.
Change
Mailbox . . . . . . . . . . . : MIKE
Department/Company : SPORTS
Name . . . . . . . . . . . . : Michael Jordan
E-mail address . . . . . : mjordan@champion.com
Available to . . . . . . . . : E Private, Dept, Everybody
Hint: You can send mail to everyone within a department, by coding *ALL
followed by the department name (limited to 10 characters). For this reason,
coding external addresses with a department name instead of a company name,
may prove to be useful. Anybody in the world can be considered part of some
department within your company, for mailing purposes.
Available to:
Private mailboxes will only be shown to the user that created them. Mailboxes
marked for a department will only be shown to users within the department of
the user that created them.
40
1 Introduction
Address Lists
You may define address lists that contain any number of mailboxes or Internet
addresses for sending E-mail. Address lists are maintained using item 33
Address Lists from the KeyesMail menu.
Position to:
Options: 1=Select 2=Edit authority 3=Copy 4=Delete 7=Rename 8=Chg Desc
Bottom
Files must start with the letters KML to be included in this list
F3=Exit F6=Add new file F12=Cancel F17=Top B18=Bottom
Create as many files, as desired, to contain the address lists for different
purposes or groups of users. The authority for each file can be set so that only
the appropriate groups of users can access or change each set of lists.
Note: If *Public is excluded from a List file, be sure to include the profile
KMAIL as an authorized user of the file. This must be done to allow the system
to access the lists for mailing.
Bottom
To select a List member enter a 1 in the option column. The program will end
and the member name will be sent back to the calling program.
41
1 Introduction
Recipient Addresses
Bottom
F3=Exit F17=Top B18=Bottom F19=Mailboxes F20=Phonebook
You may change any entry or clear a line to delete it
You may use F19 to open a list of mailboxes that you can select from. Or, F20
will open your default Phonebook to assist you in selecting recipients.
Recipient addresses should be entered in one of the following formats:
• account_name@domain.network
• <account_name@domain.network> (Recipients name)
• mailbox_name
You may delete recipients from the List member, by clearing lines.
42
1 Introduction
User Information
Name: Your full name.
Organization: Your company name.
E-mail address: This must match the return
address in the KeyesMail
User Setup screen.
Reply address: This can be left blank, as desired.
Server Information
Incoming mail server type: POP3
Incoming mail (POP3): Set these both to the IP address
Outgoing mail (SMTP): of your iSeries or AS/400. This
same address must also be
coded in the KeyesMail Server
Setup screen.
Account name: This must match the KeyesMail
mailbox name (upper case).
Password: This must match the password on
the KeyesMail User Setup
screen, and is case sensitive.
Secure Password Authentication This must not be used.
Delivery
Leave mail on server You may do this, if you are
sharing this mailbox.
Remove from server You must remove the mail from
the server after a few days,
unless you are also reading
the same mail using another
PC or 5250 terminal.
Note: PC's will only read mail that has a Status of *New. If you open a piece of
mail with a 5250 terminal, the Status will be changed to Opened. If you wish to
have a PC read the same piece of mail, you must use option 2 (Change) on the
Work with KeyesMail screen to change the Status back to *New.
43
1 Introduction
Firewall
Open port 18110: KeyesMail will use port 18110.
Web Browser
Set your Browser to access 'your-AS/400' can be the iSeries'
http://your-AS/400:18110/ domain name or the external
IP address.
44
2 Tutorial
2 Tutorial
✔ Choose item 31 on the menu (User Setup) and press the Enter key.
If you are a Security Administrator the program will show you the Work with
KeyesMail Users screen. If this is the case, enter a 2 beside your mailbox to go
to the User Setup screen shown below:
Mail Notification
Delivery mode . . . . . . . . . . . . . . . : B (N)=Normal, (B)=Break, ( )=None
✔ Verify that your name and return address are correct. The system will
use both of these fields in your outbound e-mail messages. Make any
necessary corrections and press the Enter key, then F3 (Exit).
45
2 Tutorial
This will start the Work with KeyesMail program where you can control all of
your E-mail messages. If this is your first time, it will probably be empty.
Bottom
F3=Exit F5=Refresh F6=Create new mail F10=Expand F11=View 2
F12=Cancel F17=Top F18=Bottom
Move the cursor to a column and press Enter to change the sort.
The system will create a unique member name in your mailbox, then it will open
the new member with the Message Editor program.
Sent:
To>
Subject:
Attach>
Options> Normal, From: "Your Name" <account-id@host.network>
Status: Created Category: In Box
Errors:
Message:
*. . .+. . . .1. . . .+. . . .2. . . .+. . . .3. . . .+. . . .4. . . .+. . . .5. . . .+. . . .6. . . .+. . . .7. . . .+.
46
2 Tutorial
Recipient Addresses
Bottom
F3=Exit F12=Cancel F16=Add/Remove @ (no send) character
F17=Mailboxes F18=AddrList F20=Phonebook
Clear or move CC (Carbon Copy) and BC (Blind Copy), as desired.
You will learn how to use the Phonebook to address your E-mail in a later
exercise, but for now you are going to send this mail to yourself.
✔ Enter your own mailbox name (user-id) on the To row and press Enter.
Your name should appear in "double quotes" and your E-mail address in <angle
brackets>. Mailboxes are automatically addressed for you. Internet addresses
can be entered in the following formats:
• "Person's Name" <account-id@host.network>
• account-id@host.network
• <account-id@host.network> (Person's Name)
✔ Press the Enter key when you are finished and the Recipient Addresses
window will be closed.
47
2 Tutorial
Sent:
To> Your Name <account-id@host.network
Subject: Test E-mail message
Attach>
Options> Normal, From: "Your Name" <account-id@host.network>
Status: Created Category: In Box
Errors:
Message:
*. . .+. . . .1. . . .+. . . .2. . . .+. . . .3. . . .+. . . .4. . . .+. . . .5. . . .+. . . .6. . . .+. . . .7. . . .+.
This is a short message that I will use to see how the Message Editor works.
I should learn how to use the Phonebook, the spell checker, how to copy
lines, and how to insert new information.
Your_first_name
Inserting Text
To insert text in a paragraph you will use the F6 (Insert/OvrTyp) key. You are
going to insert the phrase "how to adjust lines," to the last sentence in the first
paragraph.
✔ Move the cursor to the beginning of the word "how" on the second line of
the first paragraph on the far right side of the screen. Press the F6 key to
start inserting. The editor will be in Insert mode.
Notice that the rest of the current line is cleared and the words "how to copy" are
moved down to the next line.
✔ Type in the missing phrase "how to adjust lines,".
Notice that word wrapping continues to work as before, except that the rest of
the sentence is pushed down while you add more text.
✔ Press F6 again to toggle the editor into OverType mode.
The rest of the text will be automatically adjusted to fill out the remainder of the
paragraph.
Note: When you press F6 key with the cursor in the middle of a line, the editor
will always switch or stay in Insert mode. It will only toggle into OverType
mode when there is no text to the right of the cursor.
48
2 Tutorial
Spell Checking
You will use the F23 (Spell Check) key to do spell checking. Before we do that,
let's make a misspelled word to be checked.
✔ Move the cursor up to the top message line and change the word
"message" to read "mesage" by removing an "s" with the Delete key.
The spell checker starts checking for spelling errors, capitalization errors, and
for duplicate words from the cursor down. So before we get started, you must
move the cursor to the beginning of the message.
✔ Press the F10 (First) key. This moves the cursor to the top of the screen.
Now press F23 to start the spell checker.
The following window should pop onto the screen:
Sent:
To> Your Name <account-id@host.networkSpell Checker
Subject: Test E-mail message
Attach>
Options> This isNormal, a short From:
mesage thatName"
"Your I will use to see how the Message
<account-id@host.network>
Status: Created - - - - - - Category: In Box
Errors:
Message: mesage Spelling Error
*. . .+. . . .1. . Replace
. .+. . . .2.with
. . .+. . . .3. . . .+. . . .4. . . .+. . . .5. . . .+.Language:
. . .6. . . .+.American
. . .7. . . .+.
This is a shortSuggestions
message that I will use to see how the Message Editor works.
I should learnMASSAGE
how to use the Phonebook, the spell checker,1 how 1. to
Skip
copy
lines, and howMESSAGEto insert new information. 2. Skip All
MESSAUGE 3. Replace
Be sure to include a blank line between paragraphs.
5. Add to Main Dictionary
Your_first_name 6. Add to User Dictionary
Bottom 7. Exit Spell Checker
It is showing you that the word "mesage" is misspelled. One of the suggestions
should show you the correct spelling of the word.
✔ To select the suggested word "message" move the cursor down to the
line with the correct spelling, then press the Enter key.
The selected suggestion will appear in the Replace with field and (Replace) will
become the default action.
Note: Enhanced screens will use Radio buttons instead of the numbers (1-7) for
you to select an action. One way to select a Radio button action is to Tab to the
action field, cursor down, and press the Space Bar when the desired selection is
highlighted.
✔ To replace the misspelled word you may now press the Enter key.
The spell checker will then try to kick out the word "Phonebook".
49
2 Tutorial
✔ You may skip the word, leaving it as is, by simply pressing the Enter key
which will select the default action (Skip).
When the spell checker has finished checking your message, the window will
close, and return you to the Message Editor screen.
Copying Lines
You may copy individual lines of text or whole paragraphs from any message
member to the same member or to any other member using the F22 (Copy lines)
key. Let's copy the entire first paragraph to see how this works.
✔ First move the cursor to the first line of the first paragraph. It does not
matter what column the cursor is in, only the line matters.
✔ Press F22 and the line that you were on is highlighted and the cursor
moves down one line.
✔ Press F22 three more times to highlight the rest of the paragraph, plus
the blank line after it.
You now may move the cursor to any line where you wish to copy the selected
lines, in this or any other message member. We are going to copy it just above
your name, after the second paragraph.
✔ Move the cursor down to the line where you entered your name, and
press the Enter key.
A copy of the selected lines will appear at the cursor location.
✔ If you cannot see your entire message, press the Roll Up or Page Down
keys on your keyboard. You should see the following:
This is a short message that I will use to see how the Message Editor works.
I should learn how to use the Phonebook, the spell checker, how to adjust
lines, how to copy lines, and how to insert new information.
Your_first_name
50
2 Tutorial
The line you are on will now be too short, the paragraph needs adjusting.
✔ Press F4 to adjust the paragraph.
Deleting Lines
Whole lines may be removed from your message using the F13 (Delete) key.
✔ Move the cursor up to the first line of the copied paragraph. It does not
matter what column the cursor is in, only the line matters.
✔ Press the F13 key four times to remove the whole paragraph, plus the
blank line after it.
Notice that the following text lines move up to take the place of each line as it is
deleted.
The message line at the bottom of the screen will give you the following
instructions:
Send? Press Enter to mail in Batch mode, F2=Interactive, or F12=Cancel
The Message Editor will check the recipient addresses, using the routing tables,
to see if any or all are actually internal mailboxes defined in the KeyesMail
system. All internal recipients will be sent the message immediately. If there are
any external addresses, the message will be prepared for transport over the
Internet and its Status will be changed to "Out Box". These messages will be
sent through the Internet on the next mail run.
If you change your mind, before the mail has been sent, you can place your
message on Hold using option H on the Work with KeyesMail screen. This will
allow you to reopen your message, modify it, and mail it at a later time, as
desired.
✔ Press F3 (Exit) and you will be returned to the KeyesMail Menu.
51
2 Tutorial
This will start up the KeyesFile Information Manager showing you the cards in
your default Phonebook member name.
The following picture should assist you in finding the different areas on the
screen. Like all the KeyesMail programs, the information manager is sensitive
to the location of the cursor. It will perform completely different functions
depending on where the cursor is at the time you press the Enter key or a
function key.
52
2 Tutorial
Switching Members
A sample KeyesFile member containing fictitious names and addresses is
available for this exercise. We will be using it to demonstrate how you can store
and retrieve information in a number of ways. But first, you must switch to the
SAMPLE member.
To do this you need to find the location of the Member Name field. You may
want to refer to the picture on the previous page. The Member Name field is
located directly below the word *PUBLIC, in the Member Status area.
✔ Move the cursor straight up four lines from the index line, placing it into
the Member Name field and press the Enter key.
This will activate the Member Status area, allowing you to open a new member.
✔ Replace the existing member name with the name SAMPLE and press
the Enter key.
Managing Information
9 Card Tops show you the index or key to the cards. You can quickly jump to a
specific card using the Index line, but before we do that, let's see some of the
other ways of moving around.
This is one of the ways of moving around, and is normally used when the card
that you seek is only a few cards away, or you want to look at each card in a
group. For a faster scroll you can use the Page or Roll keys.
✔ Be sure that the cursor is on the Index line, then use Page Up (or Roll
Down) to scroll 8 cards at a time through the file.
There were only 11 cards in this file when we first gave it to you. As you scroll
through the file, notice that the program shows you where the bottom of the file
is, then starts the list over at the beginning of the file again.
The card top that you were on instantly moves to the front, so that you can read
the rest of the data on the card.
53
2 Tutorial
The computer will move to the first card with a Company Name that starts with
the letter S.
You now should be on the Computer Keyes card. If not, use F8 or any other
method to position yourself there.
The Card Top area is now split, showing you both the newly selected key and the
primary key to the cards. The cards are instantly shown to you in a new order
based on the newly selected key.
54
2 Tutorial
Editing a Card
We are going to duplicate the Your Name card, so that you can change it. This
should allow everyone to use the tutorial without things getting confusing.
✔ Put the cursor on the Index line of the Your Company Name card.
Notice that the message, at the bottom of the screen, tells you that you are
looking at the original (not the copy) of the card. The copy should be just
behind the original in the file. The original had card number 11. The copy will
have a higher card number.
✔ Press F8 to move to the copy of the card.
✔ You may move the cursor down to the next line, using the Field Exit key.
✔ Fill in the address, your name, phone numbers, and E-mail address as
each line is labeled.
As long as you do not press the Enter key, the Index line will stay the same as it
was when you first displayed the card.
✔ Press the Enter key to update the card and the Index line.
55
2 Tutorial
Undoing Changes
Before you press the Enter key, a function key, or a Roll key, any changes to a
card are not permanently recorded. You will be able to undo those changes
using the Home key (Alt+Home on some terminals). Lets make a change to your
card and get the original back to see how this works.
✔ Use the down arrow key to move the cursor down to the Address line.
✔ Type some garbage over the top of the good address, but do not press
the Enter key.
Remember, as long as you do not press the Enter key, a function key, or a Roll
key, you can undo the changes that you make to the card.
✔ Press the Home key twice to undo the changes.
On some terminals, you must hold down the Alt key to activate the Home key.
You will be able to tell when this is necessary, when the word Home is written
on the front of the key in green.
✔ Press the Page Down or Roll Up key to scroll down to the next 8 card
lines.
When you roll up, you should see the Card Heading column change to Notes at
the top of the column, and the number 009 appear in the Line Number field. A
lot of additional information can be added to the cards, including new Headings,
as desired.
✔ Press the Page Up or Roll Down key to scroll back up to the top of the
card.
We have successfully explored the KeyesFile Information Manager to the point
where you should be able to get around in any card file. For additional
information please refer to the PhoneBook chapter. It will show you how to
make subsetted lists, use the search function, add or delete lines, update card
headings, use the printing features, etc.
If you wish to end the tutorial now, just press the F3 (Exit) key. But if you stick
around a little longer, the following exercise will show you how to create a new
E-mail message directly from the KeyesFile Information Manager.
56
2 Tutorial
The Work with KeyesMail program will start and should show you the messages
in your mailbox. The message line at the bottom of the screen will give you the
following instructions:
Select an entry to be copied using Option 3 or press F6 for a new entry.
✔ You have your choice of copying any existing message or creating a new
message. Either method will provide you with a new message that is
automatically addressed to the recipient on the selected card.
✔ If your "Test E-mail message" from the earlier exercise still exists, key a 3
option next to it and press the Enter key. If there are no messages
available to copy, you will have to press the F6 key to create a new
message.
The system will copy the message for you and address it. This new message is
ready for you to make any changes and mail, as desired.
✔ When you are finished, press F3 (Exit) until you have ended all the
program call levels and you are back to a command line.
57
2 Tutorial
The KeyesFile Information Manager program will start and your default
Phonebook member will be opened. The message line at the bottom of the
screen will give you the following instructions:
Use F6 on Index line to add Person's name/account-id@host.network
You may use any of the KeyesFile tools to search for existing cards for the
person named, in case a card already exists in the Phonebook for this person or
company. If you find an existing card, you can enter or change the E-mail
address on that card, by typing it in as it is shown to you on the message line.
If a card does not exist, you can add a new card by moving the cursor to the
Index line and pressing the F6 key.
✔ With the cursor on the Index line, press F6 (Add).
A new card will be created with the Person's name placed in the Contact line and
the address placed in the E-mail line. You may add or update any other
information on the new card, as desired, before returning to the KeyesMail
program.
Because you really do not want to add this card to your Phonebook, the
following instructions will have you delete this card before leaving.
✔ With the bad card shown as the front card and the cursor on the Index
line, press F13 (Delete).
The message line at the bottom of the screen will give you the following
instructions:
Delete? Press Enter to confirm deletion of this card, or F12 to Cancel
✔ Press the Enter key to delete the card you just added.
✔ When you are finished, press F3 (Exit) until you have ended all the
program call levels and you are back to a command line.
58
2 Tutorial
Recipient Addresses
Bottom
F3=Exit F12=Cancel F16=Add/Remove @ (no send) character
F17=Mailboxes F18=AddrList F20=Phonebook
Clear or move CC (Carbon Copy) and BC (Blind Copy), as desired.
It will probably already have your name and address on the screen, as shown
above. Now we are going to add additional recipients.
✔ Press F20 (Phonebook) from this window.
The KeyesFile Information Manager program will start and your default
Phonebook member will be opened. The message line at the bottom of the
screen will give you the following instructions:
Use F20 on a card to select it or on a card top to select a series of cards
To select a card you must move the card to the front and position the cursor in
the Card Body area before pressing F20. You may select additional recipients
by moving new cards to the front and again pressing F20 with the cursor in the
Card Body. Up to 100 recipients can be selected in this manner.
If you wish to select a series of cards, you would position the cursor on the Card
Top of the first card in the series and press F20. The message line at the bottom
of the screen will change to:
Press Enter with cursor on last card in this series to select, or F12=Cancel
59
2 Tutorial
You then use the Roll or Page keys until you can see the last card in the series.
You move the cursor to the Card Top of the last card that you wish to select and
press the Enter key. All the cards from the first to the last will be selected.
✔ If there are a few cards with addresses in your default Phonebook, go
ahead and select some of them for this exercise. Otherwise, switch to
the SAMPLE KeyesFile member and select some of the recipients from
that member.
✔ When you have finished selecting recipients, press F3 (Exit).
You will be returned to the Recipient Addresses window. All the selected
recipient addresses will be placed on the screen underneath any existing
addresses.
Recipient Addresses
Bottom
F3=Exit F12=Cancel F16=Add/Remove @ (no send) character
F17=Mailboxes F18=AddrList F20=Phonebook
Clear or move CC (Carbon Copy) and BC (Blind Copy), as desired.
If you have opened the mail that you sent to yourself, an 01 will appear to the
right of your address, as shown above. This will show you how many internal
recipients have read your message.
The CC code, found underneath the To heading, designates carbon copy. These
recipients will be treated just the same as the original recipient, except that they
will be listed as carbon copy recipients in the message.
The BC code, may be moved up to any recipient marking it and all addresses
below it as blind copies. BC must remain below the CC recipients. Blind copy
recipients will receive the same message, but will not be listed as recipients in
the message itself.
✔ Press the Enter key after moving BC to the desired position.
The Recipient Addresses window will be closed. You can go back and see or
update the recipients at any time by moving the cursor back up to the To> line
and pressing the Enter key again.
✔ When you are finished, press F3 (Exit) until you have ended all the
program call levels and you are back to a command line.
60
2 Tutorial
Attachments (Outbound)
✔ Press F6 (New) and the Get Attachment from window will open.
61
2 Tutorial
After selecting a type, the Get Attachments from screen will be expanded to
include additional fields.
The source file member that you will be preparing as an attachment, in this
exercise, is called CPYPFSF. We included this member with the system because
it is a set of instructions that you could send to someone that you wanted to send
an iSeries Save File to. These instructions would tell the recipient how to restore
and install a Save File onto their iSeries, assuming they did not have KeyesMail
software to do it for them.
Notice the angle brackets around <Filename>. This designates a hot spot. Hot
spots in the KeyesMail programs typically open additional windows or programs
that assist you. In this case, the <Filename> hot spot can be used to open a
browser program.
✔ If you wish to explore this feature, go ahead and try it by moving the
cursor up to the hot spot and press the Enter key, otherwise:
✔ Fill out the parameters as shown below, changing the library name if
necessary, and press the Enter key.
<Filename> Description
QCLSRC Copy PF to SavF instructions
Library Member
KMLIB CPYPFSF
Translate: 2 0=None 1=AtoE 2=EtoA 3=CSV
Compress: _ 0=None 1=Fast 2=Normal 3=Max
Encrypt: _ 0=None 1=ZipStd 2=ZipAdv
The attachment will be prepared for transport over the Internet and added to
your message. The screen should show the following:
Attachments (Outbound)
Bottom
F3=Exit F6=New F10=Top F11=Bottom F12=Cancel
✔ This exercise is finished, so you can press F3 (Exit) until you have ended
all the program call levels.
62
2 Tutorial
This will bring up a screen that describes what is listed under the PSA column
heading. Position sensitive help information is available for all of the KeyesMail
programs.
✔ Press F12 or F3 to exit the help screen.
You will see that a "Y" is coded on the screen in the PSA column to show which
messages have attachments in them.
✔ Open the outbound test E-mail message that has the attachment that you
prepared in the previous exercise, using Option 5 on the Work with
KeyesMail screen.
✔ Move the cursor down to the Attach> line and press the Enter key to
open the Attachments window on your screen.
Attachments (Outbound)
Bottom
F3=Exit F6=New F10=Top F11=Bottom F12=Cancel
✔ Enter a 1 (Save attachment as) in the Option column and press the Enter
key.
63
2 Tutorial
Save Attachment as
Filename Encode
QCLSRC QUOTED
To: Folder, Library(Member) or Output Queue
KMLIB(CPYPFSF)
Type: 4 Rec Len: 92 Translate: 2 Replace: N
Normally, all of the parameters will not already have values filled out for you.
They are on this screen only because this attachment was originally defined by
you, in the previous exercise.
When attachments are created with the KeyesMail program, it tracks and sends
more information about the attachments than PC E-mail programs do. That is
because PC programs only have to deal with file names and directories, with
their attachments. The iSeries must concern itself with file names, libraries,
member names, record lengths, output queues, and so on.
We are going to save this attachment to your QTEMP library into a physical file
named TESTFILE rather than back into the source file that it came out of.
✔ Change the file name to TESTFILE.
The original file was a source file with a 92 byte record length. The physical file
that we will be creating, will only need to have an 80 byte record length,
however, because there will not be any sequence numbers or dates for each
record in the file (that source files have).
✔ Change the Type: field to 3 (PF) and change the Rec Len: field to 80.
The original data that you placed in the attachment was translated from EBCDIC
to ASCII so that PC users could read the instructions. When we save the
attachment back to the iSeries, you will want to translate it back into EBCDIC so
that you can read it on your iSeries.
✔ Change the Translate: field to 1 (AtoE).
64
2 Tutorial
Save Attachment as
Filename Encode
TESTFILE QUOTED
To: Folder, Library(Member) or Output Queue
QTEMP(TESTMBR)
Type: 3 Rec Len: 80 Translate: 1 Replace: N
Displaying Attachments
Rather than trying to view the physical file member, you can view the attachment
data directly.
✔ Enter a 5 (Display) in the Option column in the Attachments window for
the same attachment and press the Enter key.
The Display an Attachment window will open on your screen.
Display an Attachment
Filename: TESTFILE
Encoded: QUOTED
Description: Copy PF to SavF instructions
65
2 Tutorial
✔ When you are finished, press F3 (Exit) until you have ended all the
program call levels.
This concludes the tutorial. You can refer to the following chapters in this user's
guide for additional information about the KeyesMail programs.
66
3 KeyesMail
3 KeyesMail
Each user may track and control their e-mail using the Work with KeyesMail
program (shown below). This program can be started from the KeyesMail menu
or by entering KM on a command line.
Bottom
F3=Exit F5=Refresh F6=Create new mail F10=Expand F11=View 2
F12=Cancel F17=Top F18=Bottom
Move the cursor to a column and press Enter to change the sort.
Cursor positioning
A number of KeyesMail's functions are performed by moving the cursor to a
specific position and pressing the Enter key. For example, you can change the
sort order of the messages as they are shown to you, by moving the cursor to one
of the columns (Subject, To/From, Status, or Date) and pressing the Enter key.
Subject column
This shows you the first part of the subject for your e-mail messages. To change
this field, you can either open the message and change it using the Message
Editor, or simply use option 2 (Change) on one or more messages. Option 2
gives you a quick method of creating threads of conversation.
You may sort the messages by subject by moving the cursor to one of the fields
in the Subject column and pressing the Enter key. You will then be shown all
messages with that subject.
67
3 KeyesMail
Status column
This will show you the disposition of each of your e-mail messages. You may
sort the messages by this column by moving the cursor to the Status field and
pressing the Enter key. The Status is automatically maintained by the system,
but can be manually changed to any desired value using option 2 (Change) on
one or more messages.
*Accept This message was only partially retrieved. The rest of the
message has been accepted and should be retrieved on the next
mail run.
*Auto This is a new message that is being created by an API. If it
remains in *Auto status, then something went wrong.
*Failed The system tried to mail the message, but it failed. You may
open the message to read the reason for failure in the Errors
field.
*New This is a new inbound message that you have not opened yet.
*Partial This is a new inbound message that was only partially
retrieved. This happens when a message is larger than the
Max mail size auto retrieved threshold set in the KeyesMail
System Setup. You can either accept or reject the rest of the
message by opening the mail and setting your response in the
Options window.
*Reject This message was only partially retrieved. The rest of the
message was rejected and will not be retrieved.
Answered This is an inbound message that has been replied to.
Created This is a message that was created using F6 but has not been
placed in (Out Box) to be mailed yet.
Delayed The delivery of this message has been delayed.
Deliverd This outbound message has been delivered to the recipient.
This information is sent back to you when you set the When
Notify option value to either Successes or Both.
Expanded This outbound message has been expanded and sent to a list of
recipients by a mailing list program.
Forward This message has been prepared to be forwarded, but has not
been mailed yet.
Held This outbound message has been held. You must reopen the
message and press F2 to mail it.
Out Box This message will be sent on the next mail run.
Opened This is an inbound message that has been opened and read, but
has not been replied to or forwarded.
Passed This is an inbound message that has been forwarded or passed
on to someone else.
Relayed This outbound message has been relayed to a system that does
not have Delivery Status capability.
Reply This message has been prepared as a reply but has not been
mailed yet.
Sent This outbound message has been mailed.
68
3 KeyesMail
To/From column
This shows you the address for the sender (for inbound mail) or recipient (for
outbound mail). To change this field, you must open the message and change it
using the Message Editor. You may sort the messages by this column by moving
the cursor to the To/From field and pressing the Enter key.
Size column
This shows you how large each e-mail message is in K bytes. One K is defined
as 1024 bytes. The size will read * if you have purged the ASCII mail member,
using option 9 (Reduce).
PSAN column
The PSAN column shows you additional information about each of your e-mail
messages.
• P Priority (Low, Normal, High)
• S Sensitivity (Normal, Personal, Confidential)
• A Attachments (Yes, No)
• N Notification (Normal, Failures, Successes, Both)
Date column
This is the date that each e-mail message was originally received or created. If
you copy, reply, or forward an e-mail message, the new message will have the
new date.
Note: If you delete a message, it will be moved to the *Deleted category and
also given a new date. The new date is used so that the message can be purged
after the appropriate number of days, as specified in the Mail purge delay field
in the setup for each mailbox.
69
3 KeyesMail
Category>
All mail arrives in your mailbox in the category titled "In Box", except for mail
that the Spam filter routes to the "*Spam" category. You may copy or move
your mail into any category that you desire.
You can change the category of the messages that are being shown to you by
moving the cursor to the Category line and pressing the Enter key. A window
will open showing you all the categories that you have any mail in, as shown
below:
Bottom
Cursor to selection
Bottom
and press Enter
F3=Exit F5=Refresh F6=Create new mail F10=Expand F11=View 2
or F12=Cancel
F12=Cancel F17=Top F18=Bottom
Move the cursor to a column and press Enter to change the sort.
To make a selection, move the cursor down to the desired category and press the
Enter key.
Note: Mail messages are placed in the *Deleted category when they are deleted.
Mail is placed in the *Spam category automatically by the Spam filter and can
be sent there manually using the S (Spam) option. Deleted and Spammed mail
are automatically purged from the system after the Mail purge delay has passed.
You may specify the number of days before purging in the setup for each
mailbox. The default is 7 days. You can undelete a message by moving it to a
different category. You can un-Spam a message by moving it out of the *Spam
category.
By:
This shows the currently selected sort order of the e-mail messages. You may
change the sort order by moving the cursor to one of the columns (Subject,
To/From, Status, or Date) and pressing the Enter key.
70
3 KeyesMail
Mailbox>
The Work with KeyesMail program defaults to showing you your own mailbox
when it is started. You may open other mailboxes that you have been given
access to, by typing the name in the Mailbox field and pressing Enter.
You may select from a list of mailboxes by moving the cursor to the Mailbox
field and pressing Enter. A window will open showing you all the mailboxes
that you have access to, as shown below:
Select Mailbox
Options: 2=Change 3=Copy 4=Delete 5=Open 6=Print 7=Rename 8=Move
Position to
9=Reduce H=Hold
POSTMASTER
Category> In Box (K) YYMMDD
ACCOUNTING
Opt Subject To/From Status Size PSAN Date
BILL
_ Please send KeyesFax Fr Kristine Kujala <kris *New 1 P 000908
JOHN
_ Re:How to Fax an AFP To Chris Marrett <cmarr Out Box 1 000908
KRIS
_ How to Fax an AFPDS Fr Chris Marrett <cmarr Answered 2 000908
SALES
_ Re:Forms overlay que To Eldon Benton <EBent Sent 1 000907
SUPPORT
_ Forms overlay questio Fr Eldon Benton <EBent Answered 922 Y 000907
_ Re:KeyesPunch Inform To Ginny Bunn <ginny@ Sent 52 Y 000907
_ KeyesPunch Informati Fr Ginny Bunn <ginny@ Answered * 000907
Bottom
Cursor to selection
and press Enter
Bottom
or F12=Cancel
F3=Exit F5=Refresh F6=Create new mail F10=Expand F11=View 2
F12=Cancel F17=Top F18=Bottom
Move the cursor to a column and press Enter to change the sort.
To make a selection, move the cursor down to the desired mailbox and press the
Enter key.
Note: A user may only open their own mailbox unless they have been given
specific access to another mailbox using the User Setup program, as described in
the Introduction section. Users with a special authority of *SECADM may open
any other mailbox, but may not read any mail that is marked Personal.
Position to:
Type one or more characters in the Position to field and press Enter to jump
directly to a specific place in the list of e-mail messages. This field works with
the currently selected sort.
71
3 KeyesMail
Options
Option 2=Change
You can change the Subject and/or the Status field of one or more messages
using option 2. A window will open on the screen (shown below) to let you
complete the change.
Change Screen
Bottom
New Subject: Press Enter with cursor on a Subject to select it.
*Same
New Status: *Same
You can type in a new subject, or you can easily pick up an existing subject by
moving the cursor up to one of the messages and pressing Enter. That subject
will be copied into the New Subject field for you to edit, as desired. This gives
you a quick way of making conversation threads using the Subject column.
Changing the status can give you a method of setting messages aside for special
attention or again as a way of making conversation threads.
Note: The Status field, if changed, may affect auto purging functions. The
Purge KeyesMail program will only purge messages with a status of Answered,
Deliverd, Expanded, Opened, Passed, Relayed, *Reject, Sent, or <blank>, when
told to purge *NORMAL messages. You would need to purge *ALL messages,
in order to purge any of the other statuses.
Messages that have a status of Template will not be purged even if you use the
*ALL type of purge. You will have to manually delete Templates, if you want to
get rid of them.
72
3 KeyesMail
Option 3=Copy
You can copy one or more messages to another mailbox or category using option
3. A window will open on the screen (shown below) to let you direct where the
selected messages should be copied.
Copy/Move
Bottom
To: <Mailbox> <Category> Notify Rcvr
JOHN In Box Y
You may type in a new mailbox or category, or use one of the <hot spots> to
assist you in copying the messages to an existing mailbox or category.
To use a hot spot, move the cursor to the word <Mailbox> or <Category> and
press the Enter key. A selection window will open on the screen with all of the
available entries. To select one, move the cursor to the desired entry and press
the Enter key.
Option 4=Delete
This option will delete the message from the mailbox. If the mailbox has a
Delay before purge value, the mail will be temporarily moved to the *Deleted
category, and only purged after the delay. You can easily undelete a message by
moving it out of the *Deleted category.
Option 5=Open
This option opens up your message with the Message Editor so that you can edit,
read, reply, or forward the mail. See Message Editor in the following section for
more information.
Note: You cannot open any message that has a status of Out Box or if it is
actively being transmitted. You must put it on Hold to open it.
Option 6=Print
You may print a message to any iSeries printer using this option.
Option 7=Rename
You can rename an e-mail message to any unique name, as desired. This option
is especially useful for naming messages that are created as Templates.
73
3 KeyesMail
Option 8=Move
You can move one or more messages to another mailbox or category using
option 8. A window will open on the screen (shown previously) to let you direct
where the selected messages should be moved.
You may type in a new mailbox or category, or use one of the <hot spots> to
assist you in moving the messages to an existing mailbox or category.
Option 9=Reduce
You can reduce the amount of disk storage that your messages have taken using
option 9. The ASCII member, used for sending the message through the
Internet, will be deleted from the system. This will remove any attachments,
which can free up substantial amounts of disk storage. Only the smaller member
containing readable EBCDIC text will remain for future referencing.
For outbound e-mail you can reestablish the ASCII member, after it has been
deleted, by opening the message, preparing any attachments again, and using
option 2 to prepare the message for sending.
Warning! For inbound e-mail, be sure to save any attachments before using this
option. The attachment data will not be retrievable after the ASCII member is
deleted.
Option H=Hold
You cannot open any message that has a status of Out Box. However, you can
use this option to change the status to Held so that it can be opened.
Option S=Spam
This option moves a message to the *Spam category. The e-mail address will be
recorded and considered spam on future e-mails to the current mailbox.
If you move a spammed e-mail out of the *Spam category, the e-mail address
will be recorded and not considered spam on future e-mails to the current
mailbox.
Mail in the *Spam category will be purged after the Mail purge delay has been
reached.
74
3 KeyesMail
Function keys
Press this: To do this:
Roll/Page keys Scrolls through the entries in the KeyesMail Queue.
F3 Exit the program.
F5 Refresh or update the entries on the screen.
F6 Create a new mail message.
F10 Expands the data on the screen to show you additional
information about each entry.
F11 Toggles the display to show different fields for each entry.
F12 Cancels a function returning you to the previous screen.
F17 Positions you to the top of the list of entries.
F18 Positions you to the bottom of the list of entries.
E-mail Security
No one else may access the messages in your mailbox unless you or a security
administrator specifically gives them the authority. You can give other users
temporary access using the User Setup program. Please see Adding User
Mailboxes in the Introduction section for more information.
Note: Users with a special authority of *SECADM may access all other
mailboxes. However, only the owner of a mailbox can open any mail that has
been marked as Personal. Only the owner of a mailbox or security
administrators can open any mail that has been marked as Confidential.
75
3 KeyesMail
- - - - blank page - - - -
76
4 Message Editor
4 Message Editor
The Message Editor was designed to be a fast and extremely easy to use editor
for reading and preparing e-mail messages.
You start the editor by opening a message from the Work with KeyesMail screen
using option 5 (Open) or F6 (Create new mail). You can also start the editor
using F2 (Fax/E-mail) from the KeyesFile Information Manager as described in
the Phonebook section.
77
4 Message Editor
Yes, to fax a spool file you can call our API (FAXAFPDS) or simply place the spool file
in our FAXCOM output queue. Either method will cause the system to automatically
convert the AFPDS spool file to a FAX image and send it.
John :-)
--------------------
>Can we fax AFPDS spool files using the KeyesFax system.
The Message Editor screen contains all the fields necessary to send a complete
e-mail message through the Internet, with any attachments that you wish to
include. The message text section will expand to include up to 999 lines of text,
as you type.
Note: A reply mark (>) is automatically included to the left of the original text
when you make a reply to a message. You may leave any reply lines in your
response that would help remind the recipient what the response is about. You
should remove any lines that are redundant or superfluous using F13 (Delete) or
F19 (Clear below cursor).
Getting Help
The Message Editor contains a number of Help screens to assist you in using the
program. The Help key is position sensitive. The location of the cursor when
you press the Help key determines what information is displayed. Using the Roll
keys, you can move through as much of the Help text as you need.
Hot Spots
Hot spots within the Message Editor are identified by their Pink color or by a
bracket (>) character, as in To> as shown above. Hot spots bring up other
windows or programs to assist you. They are activated by placing the cursor on
the hot spot and pressing the Enter key.
78
4 Message Editor
Function keys
Press this: To do this:
Roll keys Scroll to the previous or next page of the message.
F1 Opens a window on the screen to assist you in selecting some
of the following functions.
F2 The recipient addresses are checked. The message is
immediately sent to any internal mailboxes named. If any
external addresses are found, the message is prepared for
Internet transport and placed in Out Box status to be sent on
the next mail run.
F3 Exits the Message Editor.
F4 Adjusts the current paragraph on word boundaries.
F6 Toggles insert/overtype mode at the current cursor position.
F7 Displays the previous e-mail message.
F8 Displays the next e-mail message.
F9 Toggles the roll amount between Full screen and Half screen
rolls.
F10 Brings the cursor to the first message line.
F11 Brings the cursor to the last message line.
F12 Ends the previous function request.
F13 With the cursor in the Message text area, it will delete the
current line and move the remaining lines up.
F14 Will create a Reply for the current e-mail message. The
original text will have reply marks (>) added. The original
From: or Reply-To: addresses will be copied to the recipient
address list.
F15 Will create a copy of the current message, with any
attachments, to be Forwarded to a new recipient.
F16 Adds the Signature text for the current mailbox to the message
at the current cursor position.
F17 When the cursor is in the Message text area, it will toggle the
reply mark (>) ON or OFF of the message line.
F18 Displays the Internet header information for inbound e-mail
messages.
F19 Clears the entire message below the cursor, to allow for new
text.
F20 Opens up your default Phonebook and passes it the current e-
mail address so that it can be updated.
F21 Prints the e-mail message to any iSeries printer.
F22 Selects the current line of text to be copied.
F23 Activates the spell checker starting at the current cursor
position. It will check for capitalization errors, duplicate
words, and for spelling mistakes.
F24 Displays additional function keys available for the current
display.
79
4 Message Editor
Sent:
This will show you the date and time that the e-mail message was sent.
From:
On inbound mail only, this field shows you who sent the message.
To>
On outbound mail only, this shows you the first recipient of the e-mail. If you
move the cursor up to the To> line and press the Enter key, the following
window will open on your screen:
Recipient Addresses
Bottom
F3=Exit F12=Cancel F16=Add/Remove @ (no send) character
F17=Mailboxes F18=AddrList F20=Phonebook
Clear or move CC (Carbon Copy) and BC (Blind Copy), as desired.
You may manually address the mail with up to 100 mailboxes, departments,
address lists, or Internet addresses. Only one entry is allowed per line.
F17 opens a list of internal mailboxes that you can select from.
F18 lets you create and/or select an address list.
F20 opens your default Phonebook where you can select recipients.
You may select everyone in a department by entering *ALL followed by the
department name, or to all internal mailboxes using just *ALL.
Ex: *ALL Accounting will send to everyone in accounting.
You may blank out any unwanted recipients using a Field Exit key. You may
move the CC and BC codes to the desired location to show which recipients are
to get carbon copies or blind copies. Blind copy recipients are not announced to
the others.
A plus sign (+) in the far right hand column will allow you to continue an
address onto a second line.
The number at the right hand side of the window is a count of the number of
internal recipients that have opened their copy of your e-mail message.
80
4 Message Editor
Subject:
This is used to describe the subject matter of the e-mail message.
Attach>
This shows you the first attachment, if any, that was defined for this e-mail
message. If you move the cursor to the Attach> line and press the Enter key, an
Attachments window will open on your screen. Please see Attachments
(Inbound) and Attachments (Outbound) later in this section for more information
on how to send or receive multiple attachments with your e-mail messages.
Options>
This shows you the options that have been selected for this e-mail message. If
you move the cursor to the Options> line and press the Enter key, the following
window will open on your screen:
Options
● The From address is a required field that defaults to the mailbox Return
address value. The additional addresses are optional which you can use to
further define who the original Sender was, who to Reply to, and who the
mail was Resent from, if they are different than the From address.
● The Priority field is used to specify how important the message is or how
soon it should be mailed.
● The Sensitivity field can be used to prevent others from reading the message.
Personal or private messages (P) can only be read by the owner of a mailbox.
Confidential messages (C) can only be read by the owner or by security
administrators.
● The Auto Purge field can be used to have the message automatically deleted
from the KeyesMail system after it is mailed.
● The When Notify field can be used to have the Internet SMTP mail system
notify you of the delivery status of this mail member.
● The Read Recpt field can be used to request a Read Receipt from the
recipient of this mail. If the recipient allows it, a receipt will be sent back to
the return address, when they open their mail.
81
4 Message Editor
Status:
This field shows the last 3 statuses of the e-mail message. The most current is
the left most status.
Errors:
If the message fails to be sent or delivered, the reason for failure can be found
here.
Message:
You may enter up to 999 lines of text in the message area. Each line is 76
characters wide. As you continue typing beyond the end of each line, the
program will automatically word wrap for you. You should place a blank line
between paragraphs.
If you are making a reply, the original text will be included in the message with
reply marks (>) to the left of each line. You may enter your reply above or
between the original text by toggling to Insert mode using F6 with the cursor in
the desired location.
F1=Functions>
You may press a function key, to perform any available function. If you move
the cursor to the F1=Functions> line and press the Enter key, or simply press the
F1 key the following window will open.
Cursor
John :-)to a selection
and press the Enter key
or press F12 to Cancel
--------------------
>Can we fax AFPDS spool files using the KeyesFax system.
82
4 Message Editor
To perform a function, you may press the appropriate function key, or move the
cursor down to the desired function and press the Enter key.
Only some of the available function keys were defined in the Select Function
window. The remaining functions, listed at the bottom of the screen are also
available. Many of them require that you position the cursor to a specific
location within the message text, before you press the desired function key. To
list the remaining functions, use F24 (More Keys).
83
4 Message Editor
84
4 Message Editor
Spell Checking
You may use F23 (Spell Check) to start the spell checker. It will check for
capitalization errors, duplicate words, and for spelling mistakes in your message
starting at the current cursor position. When an error is detected, the following
screen will pop up:
Spell Checker
This is a short mesage that I will use to see how the Message
------
The word that needs attention will be underlined on the screen and typed in the
Replace with field. Alternative spelling suggestions will be listed on the screen
for spelling errors.
Choosing a suggestion:
You may use the Roll keys to find a suggested spelling that you wish to choose.
Once located you may move the cursor down to the same line as the suggestion
and press the Enter key. The chosen word will be placed in the Replace with
field, capitalized appropriately, and the default action will be changed to
(Replace). To replace the word in the original text, you need only press the
Enter key again.
If you cannot find an appropriate suggestion, you may type another word in the
Replace with field and choose (Replace).
Note: Enhanced screens will use Radio buttons instead of the numbers (1-7) for
you to select an action. There are several ways to make a Radio button selection
after Tabbing to it:
● Use the arrow keys to move the highlight bar down to the desired action and
press the Space Bar.
● Type the access key (underlined letter) corresponding to the desired action.
● Double click on the desired action with a mouse.
85
4 Message Editor
Selecting an action:
For each incident you may Tab to the Action field and select an action to be
taken.
Skip Skip this word, leaving it as is.
Skip All Skip this word and all others with the same
spelling.
Replace Replace the word with the one that is typed
in the Replace with field.
Remove Remove the word from the text. This is only
available for duplicate word errors.
Add to Main Dictionary This will add the word to the main
dictionary that everyone uses.
Add to User Dictionary This is the recommended add option. It
will add the word to a user specific
dictionary.
Exit Spell Checker This will stop the Spell Checker.
86
4 Message Editor
Attachments (Inbound)
If any attachments were received with an inbound e-mail message, the first will
be shown to you on the Attach> line, of the Message Editor. If you move the
cursor to the Attach> line and press the Enter key, the following window will
pop onto your screen.
Attachments (Inbound)
Bottom
F3=Exit F10=Top F11=Bottom F12=Cancel
You may display any attachment or save them to your iSeries or to a shared
folder.
Save Attachment as
Filename Encode
QCLSRC BASE64
To: Folder, Library(Member) or Output Queue
KMLIB(WRKKML)
Type: 4 Rec Len: 80 Translate: 1 Replace: N
Filename:
The system will set this to the original name of the e-mail attachment, however,
you can change the name to the desired destination.
Note: See Uncompression & Unencryption later in this chapter, for additional
information.
87
4 Message Editor
Encode:
This cannot be changed. It tells you how the attachment was encoded for
transport over the Internet. Most attachments are transported with either
QUOTED or BASE64 encoding. Text attachments can also be transported using
either 7BIT or 8BIT ASCII encoding, but this is rare.
QUOTED encoding is usually used for text attachments, whereas, BASE64 is
normally used for binary attachments.
Description:
The system will set this to the original description from the e-mail attachment,
however, you may change the description, as desired.
To:
You must set this field to where you wish to save the attachment.
• For PC type documents, enter a shared folder path.
• For iSeries source or physical files, enter a library name followed by a
member name in parenthesis.
• For iSeries spool files, enter the name of an output queue.
• For iSeries save files, enter a library name.
Type:
Set the type according to where you will be saving the attachment.
• If it will be saved on a shared folder, set this to 1 or 2 depending on
whether it was a text or a binary file.
• If it will be saved as an iSeries physical file, set this to 3.
• If it will be saved as an iSeries source file, set this to 4.
• If the attachment was an iSeries spool file saved using IBM's GETSPLF
command, set this to 5.
• If the attachment was an iSeries save file, set this to 6.
Rec Len:
Set this field to the file's record length for iSeries physical files or iSeries source
files only. If the destination file already exists, it must have a matching record
length. For new files, this will be the record length of the file that is created.
Note: For iSeries source files, set this field to the length of the data plus 12
additional bytes that is used for the date and sequence numbering in the source
file.
88
4 Message Editor
Translate:
This field can be used to have the attachment data translated while it is being
saved.
• 0 = No translation
• 1 = Translate from ASCII to EBCDIC
• 2 = Translate from EBCDIC to ASCII
• 3 = UnEncrypt by supplying the password
Note: See Uncompression & Unencryption later in this chapter, for additional
information.
Replace:
Code a Y in this field if you wish to replace an existing PC file, iSeries Physical
file member, source member, or (or member) on the iSeries with the same name.
Option 4=Remove
Select option 4 to remove an attachment from the e-mail message. You may
want to remove an inbound attachment before forwarding or copying the
message to someone else.
Option 5=Display
You may display an attachment on your iSeries screen, by selecting option 5.
The following window will pop onto your screen:
Display an Attachment
Filename: SAMPLE.DOC
Encoded: QUOTED
Description: Word document
The program will optionally translate and temporarily save the attachment as a
78 character wide physical file in your QTEMP library. This is then displayed
on your screen.
Notes: This will be most useful for displaying text based iSeries or PC type
documents, such as physical files or word processing files.
It can also be used to view an archive (ZIP) file, to see the names of the objects
that are included. You may need to know their exact names to be able to
uncompress or unencrypt them.
89
4 Message Editor
90
4 Message Editor
Attachments (Outbound)
You can define up to 99 different attachments with each outbound e-mail
message. While using the Message Editor, if you move the cursor to the Attach>
line and press the Enter key, the following window will pop onto your screen.
Attachments (Outbound)
More...
F3=Exit F6=New F10=Top F11=Bottom F12=Cancel
Option 2=Change
Use this option to change a definition of an attachment. When you change an
attachment, the data will be retrieved and encoded for transport again.
Option 4=Remove
Select option 4 to remove an attachment from the e-mail message.
Option 5=Display
This option will work the same as described previously for inbound attachments.
91
4 Message Editor
You must select a type for the attachment before you can define it.
1 PC text file located in the IFS or a shared folder.
2 PC binary file located in the IFS or a shared folder.
3 iSeries physical file member.
4 iSeries source file member
5 iSeries spool file
6 iSeries save file
After selecting a type, the Get Attachment from screen will be expanded to
include additional fields.
<Filename> Description
Folder
92
4 Message Editor
<Filename> Description
Library Member
You may use the <Filename> hot spot to open a browse screen to assist you in
selecting the iSeries physical file or source file, library, and member for the
attachment.
If the file is being sent to another iSeries, you will typically send it with no
translation. If the file is being sent to an ASCII machine, you can translate the
file to ASCII using a translation code of 2 (EtoA) or 3 (CSV / Comma Separated
Values). CSV is the best way to translate data that will be imported into spread
sheets, such as Excel.
See Compression & Encryption later in this chapter, for additional information.
Type 5 (SplF)
You may use the <Spool File> hot spot to open a browse screen to assist you in
selecting the iSeries spooled file and all its parameters for the attachment. You
may select specific pages, but only if you specify a translation code other than 0
(None).
93
4 Message Editor
The entire spooled file can be sent as a spooled file to another iSeries, if you
specify no translation. The other iSeries can restore the spooled file to one of its
own output queues. If the recipient does not have KeyesMail software, they can
follow the instructions that you can find in the Appendix section to restore the
spooled file.
Selected pages of the spooled file can be sent if you translate it.
You can translate AFPDS or *USERASCII spooled files into TIFF Images
(translation 3). These can be viewed and printed by PC users, as well. All
windows based PC's have TIFF viewers available to them, for example the Wang
viewer or the Kodak viewer.
Rich Text Format (translation 4) is a convenient format for sending *SCS
spooled files to a PC user. Most PC's will have an RTF reader (MS Word, Lotus
WordPro, & WordPerfect are examples) that can easily view and print the
document by simply clicking on the received attachment. The RTF file will
contain all the page and font formatting necessary to print each spooled page
properly, without any user intervention. KeyesMail will use the Page Width and
Page Length spooled file attributes to determine the proper font sizes.
You can map (translation 5) spooled data onto an overlay to fill out a form
before mailing it. The overlay must be an RTF image that you create
specifically for the form with substitutable fields where the spooled data will be
mapped. The spooled file is then mapped onto the form using mapping entries.
Detailed information about Mapping a Spooled File to an Overlay can be found
in the Appendix section of this manual.
Portable Document Format (translation 6) is a popular way of sending any type
of spooled file. Adobe's Acrobat reader is available to most personal computers
for free on the Web. KeyesMail will use the Page Width and Page Length
spooled file attributes to determine the proper font sizes.
See Compression & Encryption later in this chapter, for additional information.
94
4 Message Editor
Type 6 (SavF)
Library
Translate: 0 0=None
Compress: _ 0=None 1=Fast 2=Normal 3=Max
Encrypt: _ 0=None 1=ZipStd 2=ZipAdv
You may use the <Save File> hot spot to open a browse screen to assist you in
selecting the iSeries save file and its library for the attachment. The translation
code must be 0 (None).
The save file can only be used on another iSeries. If the recipient does not have
KeyesMail software, they can follow the instructions that you can find in the
Appendix section to restore the save file.
See Compression & Encryption later in this chapter, for additional information.
95
4 Message Editor
PDF Encryption:
If you are translating a spooled file into a PDF document, you can optionally
encrypt the PDF. Do this by specifying a 3 in the Encrypt parameter. A window
will pop onto the screen, asking for a User Password and/or an Owner
Password.
A user will be able to open a PDF document and optionally print and annotate
the PDF. The user will not be allowed to change the PDF. An owner will be
able to do anything to an encrypted PDF document.
96
5 PhoneBook
5 PhoneBook
97
5 PhoneBook
KeyesFile's Screen
The KeyesFile Information Manager uses a card file layout to enter and display
all of your data. From 1 to 999 lines of data may be keyed on each card. Each
line may contain up to 45 characters.
Information may be keyed anywhere on the cards. You may use a 10 character
Card Heading area to help you key like information in the same lines of each
card.
9 card tops are shown to you at all times. The card tops show you the index or
key to the card file.
A Member Status area is used to show you the document member that is opened,
and the total number of cards in the member. A Card Status area shows you the
date, the time, and the last user-id of the person who changed each card in the
member.
Note: Many of KeyesFile's function keys are position sensitive. They will
perform a different function depending on where the cursor is located.
98
5 PhoneBook
Getting Help
KeyesFile contains a number of Help screens to assist you in using the program.
The Help key is position sensitive. The location of the cursor when you press
the Help key determines what information is initially displayed. Using the Roll
keys, you can then move through as much of the Help text as you need.
99
5 PhoneBook
100
5 PhoneBook
101
5 PhoneBook
102
5 PhoneBook
103
5 PhoneBook
104
5 PhoneBook
To copy text:
1. Free up enough lines in the target card to hold the text to be copied. You
may want to use F6 (Insert) to make room for the copy.
2. Move the cursor to the first line to be copied and press F22 (Copy).
KeyesFile will highlight the selected line.
3. You may select additional lines to be copied by moving the cursor to each
additional line and pressing F22 (Copy). If you make a mistake, you may
press F12 (Cancel) and start the selection over again.
4. Bring the target card to the front of the file.
5. Place the cursor at the beginning of the blank area in the target card and
press the Enter key.
KeyesFile will copy the text to the new location only if there is sufficient
room to make the copy without overlapping any other text on the following
lines.
Undoing Changes
You can use the Home key (Alt+Home on some terminals) to undo changes that
were just made to a card.
You must press the Home key twice to activate Undo. The first time you press
the Home key, the cursor will be moved to the home position. The second time
you press the Home key, it will undo all changes that were made since the last
time you pressed any function key, a Roll key, or the Enter key.
105
5 PhoneBook
106
5 PhoneBook
Deleting a Card
You can delete a card from a card file with the following procedure.
To delete a card:
1. Bring to the front of the card file the card you want to delete.
2. Move the cursor to the Index line at the top of the card.
3. Press F13 (Delete).
You will be asked to confirm the deletion.
4. Press the Enter key.
107
5 PhoneBook
Duplicating a Card
If the information to be keyed in a card is similar to another existing card, you
might want to copy the entire card then edit the copy as necessary.
To duplicate a card:
1. Move the cursor to the Index line or to the Card Top of the card that you
wish to duplicate.
2. Press F22 (Copy).
KeyesFile adds an exact copy of the card to the card file. The original card
will become the current card. You may press F8 (Next Card) to move to the
copy.
108
5 PhoneBook
name@host.network
E-mail addresses are recognized by the '@' character that must be keyed
as part of the address.
Using F2 (Fax/E-mail)
The F2 key can be used for two different purposes. If you have our KeyesFax
system, it can be used to create and send an image, Message member, text, or
OV document as a fax. If the cursor is positioned on an e-mail address, it will
pass the company name, contact, and e-mail address from the card to the Work
with KeyesMail program.
From the Work with KeyesMail screen, you can create a new message (using F6)
or copy any existing mail member (using option 3) to be sent to the selected
recipient.
The information that is used to address the new mail member is defined in the
user's setup screen under their personal Phonebook. If the user does not have a
personal Phonebook defined, the system Phonebook definition is used.
109
5 PhoneBook
110
5 PhoneBook
111
5 PhoneBook
112
5 PhoneBook
113
5 PhoneBook
114
5 PhoneBook
Library:
This defaults to *LIBL and specifies the library that the database file can be
found in.
To KeyesFile member:
This names the KeyesFile member that you will be importing the data into.
Records will be added to the member.
115
5 PhoneBook
To database file:
This is the name of the export file that will be built. Each record will contain up
to 1, 10, 20, 50, or 100 card lines.
Library:
This defaults to *CURLIB and specifies what library the database file should be
built in.
116
5 PhoneBook
117
5 PhoneBook
- - - - blank page - - - -
118
6 API's
6 API's
119
6 API's
Mailbox (MAILBOX)
The default value of *USER is used to change the current user's mailbox. You
may specify another specific mailbox, but you must have *SECADM special
authority to be able to change a password when you are not the owner.
Password (PASSWORD)
The default value of *SAME will not change the existing password for the
specified mailbox. You may key the new password using the proper case (upper
or lower) for each character. If any of the characters are lower case or are
special characters, then you must surround the 'password' with quotes.
120
6 API's
Mailbox (MAILBOX)
Name the mailbox where you wish to create the new e-mail message. The
default value of *USER will create the message in the current user's mailbox.
121
6 API's
Mailbox (MAILBOX)
Name the mailbox where the message exists.
122
6 API's
Subject (SUBJECT)
A Subject field can be used to briefly describe the content of the e-mail message.
The subject may be coded in this parameter or you may code *SAME to indicate
that the program should use the subject from the original template.
123
6 API's
124
6 API's
Subject (SUBJECT)
A Subject field can be used to briefly describe the content of the e-mail message.
The subject may be coded in this parameter or you may code *SAME to indicate
that the program should use the subject from the original template.
125
6 API's
Folder (FOLDER)
This is a 50 character field that is the name of the Shared Folder where the PC
file can be found.
Description (DESC)
This is a 30 character field that you can use to optionally give a brief description
of this attachment.
126
6 API's
Encryption (ENCRYPT)
Use this along with compression to password protect a file by encrypting the
data. The default value of 0 will send the attachment as-is, with no encryption.
Specify 1 for the ZipStd algorithm. This algorithm is compatible with other
standard encryption products, such as GZIP. You may code 2 for a ZipAdv -
Advanced Encryption Standard that uses a 128 bit key for Strong Encryption.
Note: This and the following option requires PKZIP software to be installed on
your iSeries and available on the library list.
Sample Code
The following code creates a mail message, adds a PC type file as an attachment,
then mails it.
PGM
KMLTXTM MAILMBR(&MEMBER) +
TOADDR('someone@theirdomain.com') +
SUBJECT('Monthly information') +
TEXT('Here is this months information +
that we generated on a PC.') +
MAILBOX(SYSTEM) SENDMBR(*NO)
MONMSG MSGID(CPF9898) EXEC(GOTO ERRORS)
KMLPCFA MAILMBR(&MEMBER) TOADDR(*SAME) +
SUBJECT(*SAME) FILENAME(PCfilename) +
FOLDER('/IFSfolder') +
DESC('Your file description') +
ANUMBER(*LAST)
MONMSG MSGID(CPF9898) EXEC(GOTO ERRORS)
GOTO CMDLBL(EXIT)
127
6 API's
Subject (SUBJECT)
A Subject field can be used to briefly describe the content of the e-mail message.
Code the subject in this parameter or code *SAME to use the subject from the
original template.
128
6 API's
Library (LIBRARY)
This is a 10 character field that identifies the library where the Physical file can
be found. The default value of *LIBL tells the program to search the current
library list for the file. You may also enter *CURLIB to search the current
library for the file.
Description (DESC)
This is a 30 character field that you can use to optionally give a brief description
of this attachment.
129
6 API's
Encryption (ENCRYPT)
Use this along with compression to password protect a file by encrypting the
data. The default value of 0 will send the attachment as-is, with no encryption.
Specify 1 for the ZipStd algorithm. This algorithm is compatible with other
standard encryption products, such as GZIP. You may code 2 for a ZipAdv -
Advanced Encryption Standard that uses a 128 bit key for Strong Encryption.
Note: This option requires PKZIP software to be installed on your iSeries and
available on the library list.
130
6 API's
Sample Code
The following code creates a mail message, adds a physical file member as an
attachment, then mails it.
PGM
KMLTXTM MAILMBR(&MEMBER) +
TOADDR('someone@home.com') +
SUBJECT('System failure message') +
TEXT('The system has failed to complete +
the weekend process.') +
MAILBOX(SYSTEM) SENDMBR(*NO) +
RMVMSG(*YES) PRIORITY(H)
MONMSG MSGID(CPF9898) EXEC(GOTO ERRORS)
KMLPFMA MAILMBR(&MEMBER) TOADDR(*SAME) +
SUBJECT(*SAME) FILENAME(yourfile) +
MEMBER(yourmbr) LIBRARY(yourlib) +
DESC('Your file description') +
ANUMBER(*LAST)
MONMSG MSGID(CPF9898) EXEC(GOTO ERRORS)
GOTO CMDLBL(EXIT)
131
6 API's
Filename (FILENAME)
The name of the file that will be saved is coded in this parameter. You can code
*SAME, which will use the name of the file that was originally sent by the
sender.
Description (DESC)
This will be used as the text description on the saved attachment. You can code
*SAME, which will use the description as it was originally sent by the sender.
132
6 API's
Folder (FOLDER)
If you are saving either a PC Text of PC Binary file, you must name the Shared
Folder where you want it to be placed. The folder must already exist and you
must have access to it.
Library (LIBRARY)
When you save a Physical File, Source File, or Save File you must name the
library where you want it to be placed. The library must already exist and you
must have access to it.
133
6 API's
Sample Code
The following code could be placed at line #125 in the CL program called
KMLADD. The source code for this is located in QCLSRC in KMLIB. It
would look for mail coming into a Mailbox called INVENTORY with a Subject
of "Weekly Inventory". When this is found it would submit this API to save the
attachment into an Inventory file.
134
6 API's
Subject (SUBJECT)
A Subject field can be used to briefly describe the content of the e-mail message.
The subject may be coded in this parameter or you may code *SAME to indicate
that the program should use the subject from the original mail member.
135
6 API's
Description (SPLDESC)
This is a 30 character field that you can use to briefly describe the contents of the
spool file.
Number (NUMBER)
This is a 6 character field used to specify the number of the job that created the
spooled file. You may leave this parameter blank if you coded * for the Job
Name parameter above.
136
6 API's
followed by a CR/LF.
You can translate AFPDS or *USERASCII spooled files into TIFF Images
(translation 3). These can be viewed and printed by PC users, as well. All
windows based PC's have TIFF viewers available to them, for example the Wang
viewer or the Kodak viewer.
Rich Text Format (translation 4) is a convenient format for sending *SCS
spooled files to a PC user. Most PC's will have an RTF reader (MS Word, Lotus
WordPro, & WordPerfect are examples) that can easily view and print the
document by simply clicking on the received attachment. The RTF file will
contain all the page and font formatting necessary to print each spooled page
properly, without any user intervention. KeyesMail will use the Page Width and
Page Length spooled file attributes to determine the proper font sizes.
Portable Document Format (translation 6) is a popular way of sending any type
of spooled file. Adobe's Acrobat reader is available to most personal computers
for free on the Web. KeyesMail will use the Page Width and Page Length
spooled file attributes to determine the proper font sizes.
137
6 API's
138
6 API's
Sample Code
The following code creates a mail message, adds a spooled file translated to a
PDF as an attachment, then mails it.
PGM
KMLTXTM MAILMBR(&MEMBER) +
TOADDR('customer@their.com') +
SUBJECT('Purchase Order') +
TEXT('Here is the Purchase Order +
that we discussed.') +
MAILBOX(POSTMASTER) SENDMBR(*NO) +
MONMSG MSGID(CPF9898) EXEC(GOTO ERRORS)
139
6 API's
*SCAN(xxx)
Use *SCAN to tell the program how to find the addresses in the spooled data.
For example, *SCAN(To:) would tell the program to scan each page for the
characters To:. If these characters are found, the address is taken from the 60
characters that follow in the spooled data.
Two adjacent blanks in the spooled data will end the address. For example, if
you coded *SCAN(To:) and a spool line contained:
> To: "John Doe" <jdoe@somecompany.net> Other information ...
The address would be "John Doe" <jdoe@somecompany.net>. The two
blanks just before the words (Other information) will prevent the program from
considering those words as part of the address.
*LOC(L=xx,C=xxx):
Use *LOC to tell the program exactly where to find each address on each page
of the spooled data. For example *LOC(L=5,C=15) would tell the program to
start looking in column 15 of line 5 on each page for an address. If any data is
found in that location within 60 characters, this will be used as the address.
140
6 API's
Two adjacent blanks in the spooled data will end the address. For example, if
you coded *LOC(L=5,C=3) and line 5 contained:
> jdoe@somecompany.net (John Doe) Other information ...
The address would be jdoe@somecompany.net (John Doe). The two blanks
just before the words (Other information) will prevent the program from
considering those words as part of the address.
Coding rules
Combinations of hard coded addresses, *SCAN, and *LOC values can be used
together. Any hard coded addresses will be used for all pages. Addresses found
in the spooled data using the *SCAN or *LOC parameters will only be used on
the pages where they were found.
If no new addresses are found for a page, or if all of the new addresses are
exactly the same, the data on that page will be considered a continuation of the
previous page. If any address is different, a new message will be started and it
will be sent to the new list of recipients.
Subject (SUBJECT)
A Subject field can be used to briefly describe the content of the e-mail message.
The subject may be hard coded in this parameter or you may code *SCAN or
*LOC values to indicate that the program should retrieve the subject from the
spooled data.
*SCAN(xxx)
Use *SCAN to tell the program how to find the subject in the spooled data. For
example, *SCAN(Subj:) would tell the program to scan each page for the
characters Subj:. If these characters are found, the subject is taken from the 60
characters that follow in the spooled data.
Two adjacent blanks in the spooled data will end the subject. For example, if you
coded *SCAN(Subj:) and a spool line contained:
> Subj: Purchase Requisition #4563 Other information ...
The subject would be Purchase Requisition #4563. The two blanks just before
the words (Other information) will prevent the program from considering those
words as part of the subject.
*LOC(L=xx,C=xxx)
Use *LOC to tell the program exactly where to find the subject on each page of
the spooled data. For example *LOC(L=5,C=15) would tell the program to
start looking in column 15 of line 5 on each page for the subject. If any data is
found in that location within 60 characters, this will be used as the subject.
Two adjacent blanks in the spooled data will end the subject. For example, if you
coded *LOC(L=5,C=3) and line 5 contained:
> Purchase Requisition #4563 Other information ...
The subject would be Purchase Requisition #4563. The two blanks just before
the words (Other information) will prevent the program from considering those
words as part of the subject.
141
6 API's
Coding rules
If you hard code a subject it will be used for all pages. If you have coded a
*SCAN or a *LOC value for the subject, each new subject found will start a new
message, even if all of the recipient addresses are the same.
If no new subject is found for a page, or if the subject is exactly the same, the
data on that page will be considered a continuation of the previous page,
assuming none of the recipient addresses had changed.
Number (NUMBER)
This is a 6 character field used to specify the number of the job that created the
spooled file. You may leave this parameter blank if you coded * for the Job
Name parameter above.
142
6 API's
Category (CATEGORY)
Enter the category that you wish to have the messages placed in. If you leave it
blank, it will default to 'Transmitted SplFs'.
Priority (PRIORITY)
This field is used to mark how important a message is or how soon it should be
sent. (L=Low, N=Normal, H=High)
143
6 API's
144
6 API's
Sample Code
The following code creates a Weekly Sales Report in two different formats; one
in Text and the other HTML. It then e-mails this as a multipart/alternative
message to an address found in the Text spooled file.
PGM
GOTO CMDLBL(EXIT)
145
6 API's
Subject (SUBJECT)
A Subject field can be used to briefly describe the content of the e-mail message.
You should surround the value with 'single quotes' to enter lower case characters
and spaces in this parameter.
146
6 API's
Description (SPLDESC)
This is a 30 character field that you can use to briefly describe the contents of the
spooled file, or to specify a long filename.ext for the attachment. If you enter a
filename extension, in the description, this will be used to replace the default
filename that is generated by the program.
Number (JOBNBR)
This is a 6 character field used to specify the number of the job that created the
spooled file. You may leave this parameter blank if you coded * for the Job
Name parameter above.
147
6 API's
148
6 API's
Specify 1 for Fast compression with good compression amounts. Code 2 for
Normal compression with better compression amounts at a reasonable speed.
Code 3 for Maximum compression that will take the longest time.
Notes: The filename extension will be changed to .ZIP for compressed
attachments. This option requires PKZIP software to be installed on your iSeries
and available on the library list.
Priority (PRIORITY)
This field is used to mark how important a message is or how soon it should be
sent. (L=Low, N=Normal, H=High)
149
6 API's
150
6 API's
Sample Code
The following code creates an Invoice in a spooled file. It prepares an e-mail
message, adds the Invoice as a PDF attachment, adds another PDF as a second
attachment, and mails it.
PGM
KMLSPLFWM MAILBOX(POSTMASTER) +
TOADDR(&ADDRESS) +
SUBJECT('Invoice') +
FROMADDR('sales@domain.com')
SPLFILE(QPRINT) JOBNAME(*) +
SPLNBR(*LAST) RMVSPLF(*YES) +
TRANSLATE(6) TEXT('Attached you +
will find our invoice') SENDMBR(*NO)
MONMSG MSGID(CPF9898) EXEC(GOTO ERRORS)
RTVDTAARA DTAARA(*LDA (1 10)) RTNVAR(&MAILMBR)
KMLPCFA MAILMBR(&MAILMBR) FILENAME(PCFILE.PDF) +
FOLDER('/HOME') ANUMBER(*LAST)
MONMSG MSGID(CPF9898) EXEC(GOTO ERRORS)
GOTO CMDLBL(EXIT)
151
6 API's
Subject (SUBJECT)
A Subject field can be used to briefly describe the content of the e-mail message.
152
6 API's
Category (CATEGORY)
Enter the category that you wish to have the messages placed in. If you leave it
blank, it will default to 'Text Messages'.
Priority (PRIORITY)
This field is used to mark how important a message is or how soon it should be
sent. (L=Low, N=Normal, H=High)
153
6 API's
Sample Code
The following code creates a mail message, adds a physical file member as an
attachment, then mails it.
PGM
KMLTXTM MAILMBR(&MEMBER) +
TOADDR('someone@home.com') +
SUBJECT('System failure message') +
TEXT('The system has failed to complete +
the weekend process.') +
MAILBOX(SYSTEM) SENDMBR(*NO) +
RMVMSG(*YES) PRIORITY(H)
MONMSG MSGID(CPF9898) EXEC(GOTO ERRORS)
KMLPFMA MAILMBR(&MEMBER) TOADDR(*SAME) +
SUBJECT(*SAME) FILENAME(yourfile) +
MEMBER(yourmbr) LIBRARY(yourlib) +
DESC('Your file description') +
ANUMBER(*LAST)
MONMSG MSGID(CPF9898) EXEC(GOTO ERRORS)
GOTO CMDLBL(EXIT)
154
6 API's
Mailbox (MAILBOX)
Name the mailbox that you wish to be summarized. The default value of
*USER can be used to list your own mailbox. You may specify *ALL or
*EACH to list all the mailboxes. *EACH will list each of the mailboxes on a
separate page.
Note: A user may only list their own mailbox unless they have been given
specific access to another mailbox using the User Setup program. Only users
with a special authority of *SECADM may use the *ALL or *EACH values to
list all the mailboxes.
155
6 API's
Mailbox (MAILBOX)
Name the mailbox where the message exists.
156
6 API's
Mailbox (MAILBOX)
The default value of *USER is used to purge your own mailbox. You may
specify another specific mailbox or *ALL may be used to purge mail from all
mailboxes. You must have *SECADM special authority to be able to specify
*ALL, or you must have been given specific authority by a user in order to
purge their mailbox.
Note: The purge program will not purge any mail from a mailbox that has its
Disable Purge Function parameter set to Y.
157
6 API's
158
7 Output Queue
7 Output Queue
The output queue called KMLOutQ can be monitored for spooled files that you
wish to e-mail. As a spooled file becomes Ready in this output queue, it will be
automatically processed into e-mail messages and/or attachments and mailed. A
second output queue called KMLOutH can be used for High Priority e-mails. If
you use this second output queue sparingly, it offers you a method of sending
important correspondence through the system in front of the regular e-mail
traffic that might be backed up in KMLOutQ.
After processing a spooled file, it will be removed from the output queue unless
you specify *YES on the Save spooled file attribute using an OVRPRTF
command.
Using Commands:
The commands STRKMLOUTQ and ENDKMLOUTQ can be used to start and
stop KMLOutQ and KMLOutH Processing. You may wish to place
STRKMLOUTQ in your normal QSTRUP routine, so that it automatically starts
after an IPL. It is also recommended that you end the processing program
before and restart it after doing any backup of the KeyesMail data library.
159
7 Output Queue
¬Comp compression-code
This command can be used to compress the data for e-mailing.
• 0 = No compression
• 1 = Fast compression with good compression amounts.
• 2 = Normal compression with better compression amounts at a reasonable
speed.
• 3 = Maximum compression that will take the longest time.
¬Email recipient's-address
This command specifies the recipient's address. You can specify the name of a
mailbox, a department, an address list, or an Internet address for the recipient.
¬Encr encryption-code
Use this along with compression to password protect a file by encrypting the
data.
• 0 = No encryption
• 1 = ZipStd algorithm which is compatible with other standard encryption
products, such as GZIP.
• 2 = Zip Advanced Encryption Standard that uses a 128 bit key for Strong
Encryption.
Note: This option requires PKZIP software to be installed on your iSeries and
available on the library list.
160
7 Output Queue
¬From sender's-address
This command can be used to specify the sender's return address. If not
specified, the normal return address for the mailbox will be used.
¬MBox sender's-mailbox
This command specifies the sender's mailbox. The mail will be created and
mailed from that KeyesMail mailbox. If not given, the user that created the
spooled file will be considered the sender. If a mailbox does not exist for that
user's User-Id, the mailbox called POSTMASTER will be used. This command
will be ignored, if you specify a Template using the ¬Temp command, described
below.
¬Owner password
Use this to specify an owner password for PDF documents that are being
encrypted. An owner can do anything to a PDF document. The password can be
up to 32 characters in length and is case-sensitive.
¬Pass password
Use this to specify a password for files that are being encrypted. The password
can be up to 64 characters in length and is case-sensitive.
Note: There is no way to extract a password from an encrypted file. If the
password is forgotten, the file will become inaccessible.
¬Subj subject
This command specifies the subject of the e-mail message. If no subject is
specified, the system will use a generic subject.
¬Temp mail-member
This command specifies the name of a mail member that you wish to use as a
template for adding the spooled file as an attachment. See How to Create a
Template in the Appendix for more information.
You may specify the special value *MESSAGE instead of the name of a mail
member to cause the spooled file to be converted into the e-mail message instead
of an attachment. You may code *HTML if the spooled file contains HTML for
the message. The HTML that you send is not limited to text. It can contain
Images and website references, as long as those references are available to the
recipient.
¬Trans translation-code
This can be used to specify the type of translation for the spooled file.
• 0 = No translation (Only to another iSeries)
• 2 = ASCII text
• 3 = TIFF Image
• 4 = RTF (Rich Text Format)
• 5 = Map to Overlay (Requires the Front Side Overlay)
• 6 = PDF (Portable Document Format)
161
7 Output Queue
¬User password
Use this to specify a user password for PDF documents that are being encrypted.
A user can view a PDF and can optionally print and annotate a PDF. A user
cannot change a PDF document. The password can be up to 32 characters in
length and is case-sensitive.
162
7 Output Queue
Bottom
F3=Exit F12=Cancel F17=Top F18=Bottom
You may add a new spooled file description by entering the spooled file name on
the top line.
Option 2 (Change) may be used to change existing spooled file descriptions.
Option 3 (Copy) may be used to copy a description to another name.
Option 4 (Delete) may be used to remove entries that are no longer needed.
163
7 Output Queue
Message . . . . . : Attached you will find Invoice #¬1. If you have any questions please
contact your salesperson at (800) 555-1212.
You can use ¬n to substitute any of the Scan Field Values into the message.
164
7 Output Queue
To address
For spooled files that always go to the same recipient or list, you may code the
address here.
Template
This is the name of a mail member that you would like to use as a template for
adding the attachment. See How to Create a Template in the Appendix for more
information.
Leave this field blank if you will be keying a message on the Message Screen,
described on the following page.
You may specify the special value *MESSAGE in this field to cause the spooled
file to be converted into the e-mail message instead of an attachment. You may
code *HTML if the spooled file contains HTML for the message. The HTML
that you send is not limited to text. It can contain Images and website
references, as long as those references are available to the recipient.
Subject
This will be used as the subject of the e-mail message. If no subject is specified,
the system will use a generic subject for the message. This field may be coded
with substitution values ¬1 - ¬10, see Scan fields on the following page for
more information.
From address
This is the sender's return address. If not specified, the normal return address
from the sending mailbox will be used.
Mailbox
This specifies the sender's mailbox. The mail will be created and mailed from
that KeyesMail mailbox. If not given, the user that created the spooled file will
be considered the sender. If a mailbox does not exist for that user's User-Id, the
mailbox called POSTMASTER will be used. This parameter will be ignored, if
you specify a Template name.
Translation
This specifies how to translate the spooled file pages into an attachment.
• 0 = No translation (Only to another iSeries)
• 2 = ASCII text
• 3 = TIFF Image
• 4 = RTF (Rich Text Format)
• 5 = Map to Overlay (Requires the ¬Map command)
• 6 = PDF (Portable Document Format)
165
7 Output Queue
Map Overlay
This is used to map spooled file pages onto a forms overlay. The translation
code is automatically assumed to be 5 (Map) when you specify an overlay. The
overlay that you name, must exist as a member in the files KMLTEMP and
KMLMAP. See Mapping a Spooled File to an Overlay in the Appendix section
for more information.
Exit Program
An exit program can be used to look up addresses in your master files. All the e-
mail parameters and the Scan Field Values are sent to the exit program for each
page of the spooled file, as it is being processed. The exit program can add to or
change any of the e-mail parameters, as needed. The Scan Field Values can be
used by the exit program for chaining or substitution into other fields, such as the
Subject or Return address.
A sample exit program called EXITPGM can be found in the source file called
QRPGSRC in KMLIB. You may copy this source code to any other name, in
any library so that you can add your own custom code, to make your exit
programs.
Message
Up to 1024 characters of text may be keyed to be used as the e-mail message.
The spooled file pages will be added as attachments to the message. You may
code ¬n (where n is the Scan Field number) within the message to substitute
Scan Field Values taken from each page of the spooled file.
166
7 Output Queue
ABC Company
123 Address
Anytown, USA
Total $41.00
Notes: In this example, the top four print lines were used to specify e-mail
commands which give the destination addresses, the name of a forms overlay,
the subject to be used, and the name of a template to be used for the message that
goes with the attached document.
These e-mail commands will be stripped out of the spooled file before it is
mapped to the OrderForm overlay.
167
7 Output Queue
¬Comp compression-code
This command can be used to compress the data for e-mailing.
• 0 = No compression
• 1 = Fast compression with good compression amounts.
• 2 = Normal compression with better compression amounts at a
reasonable speed.
• 3 = Maximum compression that will take the longest time.
¬Desc description
This command can be used to specify a description up to 30 characters long for
each of the attachments within the spooled file. If you code a filename extension
at the end of the description (a dot followed by 2 or 3 characters), the description
will be used as the attachment filename. This is used as the Page Description
when faxing.
¬Email recipient's-address
This command specifies the recipient's address. You may code up to 10
different recipients for each page. You can specify the name of a mailbox, a
department, an address list, or an Internet address for each of the recipients.
¬Encr encryption-code
Use this along with compression to password protect a file by encrypting the
data.
• 0 = No encryption
• 1 = ZipStd algorithm which is compatible with other standard encryption
products, such as GZIP.
• 2 = Advanced Encryption Standard that uses a 128 bit key for Strong
Encryption.
Note: This option requires PKZIP software to be installed on your iSeries and
available on the library list.
¬Fax # phone-number
This command can be used to fax the document through the KeyesFax system.
Only 1 fax number can be specified along with up to 9 e-mail addresses for the
same page. Other fax commands, described in the KeyesFax manual, can be
coded for any pages that will be faxed.
¬From sender's-address
This command can be used to specify the sender's return address. If not
specified, the normal return address from the sending mailbox will be used.
168
7 Output Queue
¬Map overlay-name
This command is used to map spooled file pages onto a forms overlay. The
translation code is automatically assumed to be 5 (Map) when you specify an
overlay. The overlay that you name, must exist as a member in the files
KMLTEMP and KMLMAP. See Mapping a Spooled File to an Overlay in the
Appendix section for more information.
¬MBox sender's-mailbox
This command specifies the sender's mailbox, where the mail will be created and
mailed from. If not given, the user that created the spooled file will be
considered the sender. If a mailbox does not exist for that user's User-Id, the
mailbox called POSTMASTER will be used. This command will be ignored if
you specify a Template name.
¬Msg embedded-mail-message
Up to 256 characters of text may be embedded in a *USERASCII spooled file,
to make up the mail message.
¬Owner password
Use this to specify an owner password for PDF documents that are being
encrypted. An owner can do anything to a PDF document. The password can be
up to 32 characters in length and is case-sensitive.
¬Pass password
Use this to specify a password for files that are being encrypted by PKZIP. The
password can be up to 64 characters in length and is case-sensitive.
Note: There is no way to extract a password from an encrypted file. If the
password is forgotten, the file will become inaccessible.
¬Subj subject
This command specifies the subject of the e-mail message. If no subject is
given, the system will create a generic subject.
¬Temp mail-member
This command specifies the name of a mail member that you wish to use as a
template for adding the attachment. See How to Create a Template in the
Appendix for more information.
Leave this field blank if you will be keying a message on the Message Screen,
described on the Spooled File Setup Screens.
You may specify the special value *MESSAGE in this field to cause the current
page to be converted into the e-mail message instead of an attachment. You may
code *HTML if the spooled file contains HTML for the message. The HTML
that you send is not limited to text. It can contain Images and website
references, as long as those references are available to the recipient. Further
pages for the same recipient addresses can then be sent as attachments to this
message page.
169
7 Output Queue
¬Trans translation-code
This command specifies what type of attachment that you would like the page
translated into:
• 0 = No translation (Only to another iSeries or AS/400)
• 2 = ASCII text
• 3 = TIFF Image
• 4 = RTF (Rich Text Format)
• 5 = Map to Overlay (Requires an overlay name)
• 6 = PDF (Portable Document Format)
¬User password
Use this to specify a user password for PDF documents that are being encrypted.
A user can view a PDF and can optionally print and annotate a PDF. A user
cannot change a PDF document. The password can be up to 32 characters in
length and is case-sensitive.
170
Appendix
Appendix
171
Appendix
172
Appendix
173
Appendix
174
Appendix
175
Appendix
Substitutable fields:
Use a caret symbol (^) for each substitutable field that you want to be mapped
onto the overlay from the iSeries spooled file printer data. Define tab stops for
one or more lines to position multiple fields on each line. Place the caret symbol
exactly where you want the field to start on the form, using a single tab between
each caret and a carriage return at the end of each line. Select a font for each of
the carets as you would like the substituted field to be printed.
Text Boxes:
Do not place any of the carets in any Text Box or Frame. All carets must be
coded in the main body of the document. Headings, lines, logos, etc. can be
positioned using Text Boxes. However, the Text Boxes should be positioned
relative to the Page top and side (not the Column or Paragraph). To force an
object to print on top of another, do not use the ORDER method. Instead you
must create each object in the order you want them to be written on the page.
The last one created will be on top.
176
Appendix
The sample overlay INVOICE, shown above, is included in the KeyesMail Data
library (KMDATA) in the file KMLTEMP for your review.
Note: The first caret (^) defined, for the Invoice number, was created with a
larger font. One caret was then coded where each field is to be positioned, using
the desired font.
The carets are positioned on the page using single tabs and no spaces. Each
caret is replaced with fields of varying length from the iSeries spooled file. If
spaces or multiple tabs were used between carets, this would cause the fields not
to be aligned on the finished document.
177
Appendix
C12345
7/15/99 JOHN
178
Appendix
07 68 06 Invoice number
10 55 08 Date
13 08 31 Attention (Ship to)
13 50 30 Attention (Sold to)
14 08 30 Company
14 50 30 Company
15 08 30 Address #1
15 50 30 Address #1
16 08 30 Address #2
16 50 30 Address #2
17 08 30 City, St Zip
17 50 30 City, St Zip
21 02 09 Order number
21 15 08 Date Shipped
21 27 15 Shipped Via
21 61 20 Terms
25 05 04 Qty #1
25 14 40 Desc
25 57 11 Unit Cost
25 70 11 Extended
26 05 04 Qty #2
26 14 40 Desc
26 57 11 Unit Cost
26 70 11 Extended
27 05 04 Qty #3
27 14 40 Desc
27 57 11 Unit Cost
27 70 11 Extended
28 05 04 Qty #4
28 14 40 Desc
28 57 11 Unit Cost
28 70 11 Extended
29 05 04 Qty #5
29 14 40 Desc
29 57 11 Unit Cost
29 70 11 Extended
30 05 04 Qty #6
30 14 40 Desc
30 57 11 Unit Cost
30 70 11 Extended
31 05 04 Qty #7
31 14 40 Desc
31 57 11 Unit Cost
31 70 11 Extended
37 70 11 Total Amount
Each record will correspond to one of the substitutable fields that you defined in
the overlay. All of the data from the Spooled file does not have to be mapped
onto the overlay. In the above example, the Salesman field "JOHN" has no table
entry because it does not appear on the overlay. Also the comment "Total
Amount Due" was coded as a constant on the overlay, therefore it was not coded
as a substitution field.
179
Appendix
Substitution fields:
Each of the remaining lines of the spooled file will contain a single field value to
be mapped to the overlay. Each field should start in column 1, but can be right
adjusted for the length of the field. Blank lines will define blank values. All the
lines must fit within a single page of the spooled file. You must define the page
length long enough to contain all of the desired substitution fields. For example,
if there are 120 fields to be mapped to a form, you must define the page length at
least 121 lines per page.
Additional pages in the spooled file can contain continuation pages for the
document or additional documents. The additional pages can map to the same or
different templates. All pages processed will be placed in the same attachment.
180
Appendix
OVERLAY: INVOICE
C12345
7/15/99
ATTN: JOE CUSTOMER
- SAME -
JC COMPANY
123 STREET
ANYTOWN, USA
VERBAL
7/15/99
Priority Air Mail
30 Day Trial Period
1
KeyesMail - Version 3.0 Software
3,000.00
3,000.00
2
Extra user's guides
25.00
50.00
1
Shipping & handling charges
5.00
5.00
3,055.00
181
Appendix
Note: Any PC user that receives the e-mail can simply click on the attachment
to open it up, with any RTF reader. They will be able to view and print the
document, as desired. MS Word, Lotus WordPro, and WordPerfect are all
examples of RTF readers.
182
Appendix
183
Appendix
184
Appendix
In this example, all mail sent from the POSTMASTER mailbox will be
duplicated to both the JOHN mailbox and the SUPPORT mailbox, using Blind
Copy addresses.
185
Appendix
186
Appendix
We have supplied tools that will allow you to create PCL printer data directly
from your application programs in standard *SCS printer files. PCL and GL/2
vector graphics data contain escape sequences that all start with an ASCII Esc
character followed by standard ASCII characters (in most cases).
We have provided a program that automatically transforms standard EBCDIC
spool files into ASCII PCL. It will translate the EBCDIC negate character (¬)
into an ASCII Esc character, strip out blanks at the ends of each line, and add
Carriage Return/Line Feeds for each print line to the data. Using this technique
you should be able to print any type of PCL graphics, lines, boxes, shading
patterns, etc. using regular *SCS printer files. For example, the following line in
a printer file would print a line across the page:
¬*p212y0X¬*c2b3326a0P
You must specify the phrase "EBCDIC PCL" in either the Form Type or the
User Data field of a spooled file, for KeyesMail to be able to recognize that you
have created EBCDIC PCL.
187
Appendix
- - - - blank page - - - -
188
Index
Index
A
Account information (E-mail) 18
Adding cards (KeyesFile) 100
Adding lines to cards (KeyesFile) 100
ADDLIBLE 16
Address lists 41, 80
Addresses for connection 18
Addresses for Internet Servers 18
Addresses in cards (KeyesFile) 110
Addressing E-mail
Using address lists 41, 80
Using mailboxes 40, 47, 80
Using phonebook 57, 59, 80
Adjusting E-mail paragraphs 51, 84
AFPDS spooled files (converting) 94, 137
API's
Change KeyesMail Password 120
Change the Status of a Mail Member 124
Create a KeyesMail Message 121
Edit a KeyesMail Message 122, 144
List KeyesMail Categories 155
Mail a PC File as an Attachment 125
Mail a Physical File Member as an Attachment 128
Mail a Spool File as a Message 140
Mail a Spool File as an Attachment 135
Mail a Spool File with a Message 146
Mail a Text Message 152
Mail an Automatic Reply from a Template 123
Printing KeyesMail members 156
Purge KeyesMail 157
Save an Attachment to Disk 132
Attach> (Message Editor) 81
Attachments
API's 125, 128, 132, 135, 146
Compressing 126, 130, 138, 148
Defining 92
Displaying 65, 89
Encrypting 127, 130, 138, 149
Inbound 87
Outbound 91
PC files 92, 125, 132
189
Index
B
BC (Blind copies) 60
C
Card headings (KeyesFile) 106
Category (KeyesMail) 70
Category listing 155
CC (Carbon copies) 60
Change KeyesMail Password (API) 120
Change the Status of a Mail Member (API) 124
Character set (KeyesMail) 174
Comma Separate Values (CSV) 93
Communication (KeyesMail) 28
Communication line for KeyesMail 17
Compress attachments 11, 62, 126, 130, 138, 148, 160, 168
Connecting a modem 17
Connecting to a network 21
Connection
Defining 19
PPP 25
Sample System Setup 20, 21
SLIP 23
Verifying 26
190
Index
Connection scripts
Creating 22
Example 172
Rules 171
Copying
Address lists 41
Card lines (KeyesFile) 105
Cards (KeyesFile) 55, 108
E-mail text lines 50, 84
KeyesFile members 113
Mailboxes (external) 40
Messages (KeyesMail) 73
CRTKMLCOM command 17
CRTKMLSBS command 16
CSV translation 93
Cursor positioning (KeyesMail) 67
D
Date (KeyesMail) 69
Debugging an Exit Program 184
Deleting
Address lists 41
Cards (KeyesFile) 107
E-mail lines 51, 84
E-mail messages 73, 124
KeyesFile members 113
Lines in cards (KeyesFile) 104
Mail purge delay 34
Removing mail from server 33
*Deleted category 34, 70, 124
Delivery Status Notification 81
Department 32
Description command 168
Dial profiles 23, 24, 25
DIALIGN connection scripts 22
Disable Purge Function 32, 157
Displaying attachments 89
Duplicating cards (KeyesFile) 108
E
E-mail
Account information 18
191
Index
F
Failed connection (diagnosing cause) 27
Fax commands 167
Forms overlays (mapping spooled files) 94, 166, 169, 176
Forward mail automatically 33
From: (Message Editor) 80
Front side overlay 160
Function keys
KeyesFile 101, 104, 106
KeyesMail 75
Message Editor 79
Function> (Message Editor) 82
H
Headings for cards (KeyesFile) 106
192
Index
Holding E-mail 74
Hot spots (Message Editor) 78, 92, 93, 95
HTML (Sending the message as) 144, 161, 165, 169
I
Images (converting spooled files to) 94
Importing data into KeyesFile 115
Index line (KeyesFile) 54
Information Manager (KeyesFile) 52
Inserting
E-mail text 48, 84
Lines in cards (KeyesFile) 104
Installing
KeyesMail data library 14
KeyesMail program library 13, 14
Internet addresses 18, 20, 21
Internet Service Provider (ISP) 11
Introduction to KeyesMail 11
ISP (Internet Service Provider) 11
ISP connection information 18
ISP mail accounts 33
K
KeyesFile (launching E-mail from) 77
KeyesFile Information Manager 52
KeyesFile's screen 98
KeyesMail
Communication 28
Communications line 17
Connections (creating) 19
Data library 14
Granting authority to start 173
Installing 12
Introduction 11
License number 15
Mail runs 28
Program library 13, 14
Servers 37, 39
Starting & Stopping 28, 29
Subsystem 16
System setup 20
Updating an existing system 12, 14
193
Index
Users 30
Working with 67
Keying E-mail messages 47
KFLIB library 16
KM command 67
KMDATA library 14, 16
KMINSTALL command 14
KMLIB library 13, 14, 16
KMLICENSE command 15
KMLOutH for High Priority mailing 159
KMLOutQ output queue 159
KMSPOOL command 163
KMUPD command 13, 14
L
Leaving mail on the Server 43
Libraries
Data 14
Program 13
License number (KeyesMail) 15
Listing mail by categories 155
M
Mail notification 33, 35
Mail purge delay 34, 70
Mailbox
adding users 30
authorization list 35
external 40
KeyesMail 71
Mailing messages 51
Mapping spooled files to an overlay 94, 166, 169, 176
Max number of mail members 34
Max Sign-on attempts 34
Merging KeyesFile members 113
Message command 169
Message Editor
Launching from KeyesFile 77
Screen 46, 78
Starting and Stopping 77
MIME 11
Modem
194
Index
Connecting 17
Information 23
Initialization 23
Moving messages (KeyesMail) 74
multipart/alternative 135, 136, 145
N
Naming Conventions 36
Network connection 21
Notifying users (new mail) 33, 35
O
Opening E-mail 73
Options
KeyesMail 72
KeyesMail user defined 74
Message Editor 81
Out Box (status) 28, 51
Output queue processing (KMLOutH) 159
Output queue processing (KMLOutQ) 159
Overlays (creating) 176
Overlays (mapping) 94, 166, 169, 176
Owner Password 96, 138, 149
P
PB command 52
PC files (attachments) 91, 125, 132
PC mail clients 43
PC mail server 37
PCL (*USERASCII spool file translation) 94, 137
PDF Encryption 96
Personal mail accounts 33
Personal/Private messages (sensitivity) 81
Phonebook 52, 80, 97
Phonebook (starting and stopping) 97
Physical files (attachments) 93, 128, 132
PING command 26
PKUNZIP program 90
PKZIP compression & encryption 11, 16, 96
POP3 11, 37, 43
195
Index
Q
QSTRUP routine 159
QTEMP library 16
QUSRLIBL system value 16
R
Read Receipts 33, 81, 144, 150, 154
Recipient addresses 60, 80, 152
Reducing size of E-mail 74
Removing mail from server 34
Renaming e-mail 73
Reply marks (>) 78
Reply to mail automatically 34
Reply-to address 81, 144, 150, 154
Restoring iSeries Save files 175
Restrict attachments 32
Restrict to local network 32
Return address (user) 31, 32, 45
Return receipt (delivery status notification) 81
Routing entries (E-mail) 36
RSTLIB command 13
RTF (Rich Text Format) 93, 94, 137, 165, 170
S
Save attachment as 87
Save files (attachments) 95
Save files (restoring) 175
Saving attachments 63
Scan Fields (Processing spooled files) 164, 166, 170
196
Index
197
Index
T
Tape (copying programs from) 13
TCP/IP
Application servers 11, 26
Ending Point-to-Point connection 27
Modem information 23
PPP Dial profile 25
SLIP Dial profile 23, 24
Starting 26
Starting Point-to-Point connection 26
Template
How to create 183
Parameter 125, 128, 135, 161, 165, 169
Threads of conversation 67, 72
To> (Message Editor) 80
Translating spooled files (for e-mailing) 93, 136, 165, 170
Tutorial 45
U
UnCompress attachments 90
Undeleting mail messages 70
UnEncrypt attachments 87, 89, 90, 133
Updating an existing KeyesMail system 12
Updating phonebook from E-mail 58
User defined data (Spooled file attribute) 160
User defined options (KeyesMail) 74
198
Index
User mailboxes 30
User Password 96, 138, 149
User return address 32
User setup 30, 31, 45
USERASCII spooled files (converting) 94, 137
V
V.24 ports 17
Verifying attachments 26
Viewing attachments 89
W
Web browser (configuring and using) 44
When Notify (delivery status) 81
Word wrapping (KeyesMail) 47, 82
WRKHDWRSC command 17
Z
Zip Compression & Encryption 96
ZIP extension 90, 96
199