|
I think the authority *CHANGE for user *PUBLIC is understandable on those
files.
The commands using those IBM supplied files, which originally do not have
any members, have to duplicate their associated output file and add a
member to it, before filling it with data.
It is also common practice and adviced not to change the default settings
on IBM supplied objects, so I wonder why this setup of authority, when the
commands used create a copy at the moment the output file does not exist.
But then, I do not know the philosophy behind this setup.
Instead I would have created my own master (base) files for my application,
based on the IBM supplied files.
With regards,
Carel Teijgeler.
*********** REPLY SEPARATOR ***********
On 21-8-2008 at 12:09 CRPence wrote:
help the admin team.But box involved runs my team's application system, so I'm trying to
modified. For instance, QAFDMBRL which is the outfile template for
We've got an unknown number of IBM objects whose authority has been
particular, our application profile was given a private authority to it.DSPFD, was modified to allow our programs to use CRTDUPOBJ on it. In
process that has all customizations added to a script to be run after an
The /admin team/ really needs to implement a System Change Management
upgrade. What transpired is an indication that a CM process needs to beimplemented, corrected, or improved.
to the newly implemented or corrected system change management [script].
If piecemeal recovery is acceptable, add each of the recovery actions
IBM default of *PUBLIC change with no additional private
After a v5r2 --> v5r4 upgrade on our QA system QAFDMBRL was back to the
that authority would allow any *peon user to issue a CHGPFauthorities.
That suggests *PUBLIC has *CHANGE? Hmmm... that seems excessive; i.e.
QSYS/QAFDMBRL given that user has access to a command line.?install, all customized authorities would be lost. I do not recall the
If an object is deleted before being restored anew as part of an OS
processing for the model output files in QSYS, I think they are almost alldeleted before restore, and I believe the install joblog records the
/file deleted/ activity.production system and all objects on the v5r4 QA system and figure
Initial thought. dump the authorities to all objects on the v5r2
not get deleted as part of the upgrade would maintain the sameout which ones were modified on production.
Maybe not worth the effort to make comparisons. Many objects which did
authority; i.e. no difference, does not imply unmodified. To trulydetermine what were modified, requires reviewing each, irrespective of
matching or unmatched authorities... thus a generally exhaustive checkwith or without a comparison.
full system save tape from just prior to the upgrade result in
Secondary thought, can any combination of RSTUSRPRF and RSTAUT using the
versions had?having the v5r4 IBM objects given the same modified authority the v5r2
/application profile/ and then perform the RSTAUT for that user
The best bet for the specific case, would probably be to RSTUSRPRF the
profile. Since authorities are additive, the operation is fairly safe. Iwould prefer not to perform a more global restore of users &
authorities unless the private authorities are known to have beengenerally additive of the *EXCLUDE authority, such that they will be
preventing versus granting access; readdressing access failures andrequests, thus giving the opportunity to reevaluate. However, again,
restoring the profiles and authorities is a generally safe operation; andimportant option if reevaluating authority requirements could be
[considered] too costly.
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list
To post a message email: MIDRANGE-L@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/midrange-l.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.