Configuration guidelines
Follow these guidelines when you schedule a task:
Make sure all commands in a schedule are compliant to the command syntax. The system does not check the syntax when you assign a command to a job.
A schedule cannot contain any of these commands: telnet, ftp, ssh2, and monitor process.
A schedule can have a maximum of 64 user roles. After the limit is reached, you cannot assign additional user roles to the schedule. A command in a schedule can be executed if it is permitted by one or more user roles of the schedule.
Assigning the security-audit user role to a schedule removes the other user role assignments for the schedule. Assigning any other user roles to a schedule removes the security-audit user role assignment for the schedule. Only the remaining user role assignments take effect. For more information about user roles, see "Configuring RBAC."
A schedule does not support user interaction. If a command requires a yes or no answer, the system always assumes that a Y or Yes is entered. If a command requires a character string input, the system assumes that either the default character string (if any) is entered, or a null string is entered.
A schedule is executed in the background, and no output (except for logs, traps, and debug information) is displayed for the schedule.