|
I have always been a little confused with how to utilize the primary group profile (PGP) object attribute in a general application security scheme. I have used carefully thought out object ownership schemes along with authority lists and program adoption to control access to our production application objects and this has work very well. However, I've never taken into account primary group profiles. Has anyone used PGP's as an integral part of their application security scheme? Is this an attribute that might be useful in setting up a simple yet effective security scheme for controlling access to IFS objects? I wonder why this attribute even exists? IBM must have had a good reason for it... right? Inquiring minds want to know .... <smile> Kenneth **************************************** Kenneth E. Graap IBM Certified Specialist AS/400e Professional System Administrator NW Natural (Gas Services) keg@nwnatural.com Phone: 503-226-4211 x5537 FAX: 603-849-0591 ****************************************
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.