|
Review the "group profile" attribute on user profiles and understand why you want to use it. Understand object authority and how and why you want to use adopted authority. Then read up on the use of authorization lists. These are a few things you should consider as they all enhance the method of managing object access. Since you are on a brand new box with brand new configuration it would be to your benefit to do this *IMMED as the advantages of not doing so will become apparent as soon as you need to start making adjustments to your programmers/consultants needs when the do occur. It may take a bit of time at first but these concepts will put you on the track to getting started. I'd also suggest googling Wayne O, Evans as he has some excellent knowledge of security. Also there is a book titled 'tips and tools for securing your as/400' - it's a bit dated but the basics are there. Regards, Jerry Gerald Kern - MIS Project Leader Lotus Notes/Domino Administrator IBM Certified RPG IV Developer The Toledo Clinic, Inc. 4235 Secor Road Toledo, OH 43623-4299 Phone 419-479-5535 gkern@xxxxxxxxxxxxxxxx This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized use, disclosure or distribution is prohibited. If you are not the intended recipient, please inform the sender by reply e-mail and destroy this and all copies of this message.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.