×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
It sounds like you need to architect security into your development process so you know precisely what authorities are in play at any given point in the stack.
Just out of curiosity, why are you concerned about agglomerated special authorities?
-----Original Message-----
From: MIDRANGE-L [mailto:midrange-l-bounces@xxxxxxxxxxxx] On Behalf Of Tim Bronski
Sent: Tuesday, July 26, 2016 9:50 AM
To: Midrange Systems Technical Discussion
Subject: Re: Adopted authority
I am looking for the agglomerated special authorities that a program has, not the authority to a specific object. I need to choose different auditing options depending on the special authorities that are effective at that time. I don't need to know which profile the authority came from. I know I can walk the stack and build my list from there but I'd like to avoid the effort if I know that there's currently no adopted authority in place.
On 7/26/2016 6:19 PM, CRPence wrote:
I am still not clear; probably a specific example would help clarify.
Regardless, that aforementioned API might be of value.?
--
Need sFTP or PGP? Download your native sFTP or OpenPGP solutions here:
www.arpeggiosoftware.com
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options,
visit:
http://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at
http://archive.midrange.com/midrange-l.
Please contact support@xxxxxxxxxxxx for any subscription related questions.
As an Amazon Associate we earn from qualifying purchases.