× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.




Hi Jim,

At the moment I'm just writing some recommendations to improve the security model and I'm hoping authorization lists will be the way we go. It wouldn't necessarily be every library we'd want to do this for, but possibly several. I'm recommending a separate AUTL for each library so that would be easy.

If by some chance the AUTL solution does not fly though I do like your idea, that may come in very handy! Who knows, we may even implement a combination of the two and use the audit journal approach for objects in libraries not covered by an AUTL.

Thanks

Adam Driver
IBM Certified Systems Administrator - System i
Consultant - Infrastructure Technician
Exacta Corporation
608.661.6697 ext 2581
adriver@xxxxxxxxxxxx<mailto:adriver@xxxxxxxxxxxx>
Please consider your environmental responsibility before printing this e-mail.


As John suggested you can just put the AUTL on the library, or if you

need to be getting any object that is created regardless of it's

location, build a program to read the audit journal. Any time you see a

create object, put the correct authority per your policy on it.



I use that technique to move objects pesky consultants (like myself) and

occasionally employees create in libraries like QGPL, QUSRSYS, etc. into

more appropriate locations.



Jim Oberholtzer

Chief Technical Architect

Agile Technology Architects

Fact of the Day:
The Trust offers a variety of health plan options at different prices to fit the needs of districts and employees.


- WEA Trust Confidentiality Notice -

This electronic mail message and any files transmitted with it are confidential and are intended solely for the use of the individual or entity to whom they are addressed. Dissemination, forwarding, printing, or copying of this electronic mail without the consent of the sender is strictly prohibited. If you are not the intended recipient or the person responsible for delivering the electronic mail to the intended recipient, be advised that you have received this electronic mail in error; please immediately notify the sender by return mail.

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.