Change public authority.  Have your application run under owner authority
and the owner has access to update the files.  Generally you create one
entry point security program to see if that person has access to the program
they are trying to run.  This adopts owner authority for the job.  Be
careful not to give users a command line while this program is active.

Christopher K. Bipes
Sr. Programmer/Analyst
CrossCheck, Inc.
6119 State Farm Drive   Phone: 707 586-0551 x 1102
Rohnert Park CA  94928  Fax: 707 586-1884

If consistency is the hobgoblin of little minds, only geniuses work here.
Karen Herbelin - Readers Digest 3/2000

-----Original Message-----
From: Quazy []
Sent: Thursday, November 09, 2000 9:26 AM
Subject: ODBC Security

How does everyone deal with security on the 400 and the ability to use ODBC?

If production files are set to public authority to *change, what can I 
do.  users don't have access to manipulate the data from the AS/400 (I have 
taken all those ways away).  But even if a user with basically no authority 
gets on through ODBC they could do anything they want to the database.

What is there you can do?
| This is the Midrange System Mailing List!
| To submit a new message, send your mail to
| To subscribe to this list send email to
| To unsubscribe from this list send email to
| Questions should be directed to the list owner/operator:

This thread ...

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2020 by and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].