× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.


  • Subject: Re: Package Vendor that changes IBM command Defaults.
  • From: John Earl <johnearl@xxxxxxxxxxx>
  • Date: Tue, 22 Jun 1999 10:37:57 -0700
  • Organization: PowerTech Toolworks & The 400 School



James W Kilgore wrote:

> Roger,
>
> <<MODE(*REQUESTOR)>>
>
> As a software house, what can we do to provide a "painless" initial
> install or product upgrade?

The simple version is to use an Applicaiton Only Access design.  But now the 
one these
clowns have apparantly put together.  Create two owner profiles when your 
package is
installed, the first will own all the data objects and the second will own all 
the
program objects. Give *PUBLIC *EXCLUDE authority to the data objects and give 
the
Program Owner *CHANGE authority to the data objects. Then you can have some or 
all of
your programs adopt the authority of the Program Owner (thereby receiving 
*CHANGE
authority to the data) and grant specific users the rights to execute those 
programs.
Then you have a simple, clean authority system that will coexist nicely with 
other
packages that are on a system

> If you were in our shoes, what would you do/expect?  How are different
> security levels handled?

Write to Security level 40, and all lower security levels will work fine.   If 
you
write to 40 and the customer is running 10 or 20, then the security holes are 
their
fault, not yours.

> Do we ignore object security or roll our own? How do we deal with
> in-house security beyond our control that may interfere with our install
> script?

Don't ignore object authority, and don't try to roll your own (if rolling your 
own
means that you are somehow going to attempt to rewrite the rules of object
authority).  If you set the authority correctly in your package, and provide the
customer with a template on how to authorize users to your system  (Step 3, Add 
user
who should have access to the package to authorization list RUNPACKAGE), your 
package
will run fine on any system.  You just have to spend a little bit of time 
figuring out
wha the security requirements of your own package are, and then publish that 
for your
customers.

> Now I'm not ragging on you, but if your QSYSOPR has to create profiles,
> no can do.  It's beyond their profile authority. Install fails, you bad
> mouth software vendor.  Software vendor -needs- QSECOFR to create new
> profiles for secured ownership of objects.  Somewhere along the line a
> QSECOFR "like" profile has to come into play.

A QSECOFR like profile is often required at installation, but I can't imagine 
why it
would be required during day to day operations.


>  How about this: The software vendor provides a profile characteristic
> needed for installation and instructions necessary to create such a
> profile (QSECOFR alias QINSTALL) that you can disable after install?

That's fine.  No need to disable it after install, just don't use it.   There is
nothing the matter with requiring QSECOFR like authority at install time, but 
you
should not require it for run time.

> Bottom line: QSECOFR like profile -must- perform install/upgrade.

That's ususally the case.   I have no problem with that.

> Wait, I could be wrong.  The entire product is PUBLIC(*YES)
> OWNER(QDFTOWNER) or whatever is equivalent to an open barn door.

QDFTOWNER is actually preferable to QSECOFR if your package relies on adopted
authority.  That way the whole world doesn't end up sith special authorities.   
But
regardless of who owns it, *PUBLIC should only be authorized to things that you
wouldn't mind seeing published on the internet :)

jte

>
>
> You pick. I'll deliver either way.  After all, it's your machine. Your
> barn door. My lawyer can beat up your lawyer <g>
>
> Roger Vicker wrote:
> >
> > Hello,
> >
> > <<MODE(*RANT)>>
> > I have a customer where a vendor (name withheld to protect the GUILTY) for 
>one
> > of their packages, during a version upgrade, changed all the program create
> > commands to USRPRF(*OWNER) AUT(*ALL) and all the file create commands to
> > USRPRF(*OWNER) LVLCHK(*NO) AUT(*ALL). To top it off they compiled as a 
>member of
> > QSECOFR.
> <<snip>>
> >
> > <<MODE(*REQUESTER)>>
> >
> > What I would like, without creating a total flame war, is a FEW items from 
>this
> > esteemed group to show them as a backup to my lesson on how to play nicely 
>as a
> > software package vendor. I can accept the USRPRF(*OWNER) _IF_ the owner is a
> > special package owner and properly managed but definitely not QSECOFR!
> >
> > <<MODE(*HUMBLE)>>
> > Thanks In Advance.
> +---
> | This is the Midrange System Mailing List!
> | To submit a new message, send your mail to MIDRANGE-L@midrange.com.
> | To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
> | To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
> | Questions should be directed to the list owner/operator: david@midrange.com
> +---



--
John Earl                                              johnearl@toolnet.com
PowerTech Toolworks                         206-575-0711
PowerLock Network Security              www.400security.com
The 400 School                                    www.400school.com
--


+---
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to MIDRANGE-L@midrange.com.
| To subscribe to this list send email to MIDRANGE-L-SUB@midrange.com.
| To unsubscribe from this list send email to MIDRANGE-L-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: david@midrange.com
+---


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.