× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Hello,

That is roughly what we are doing here.

- A single profile is the owner of everything
- Users do not have any authority
- All programs are compile with USRPRF(*OWNER)
- All programs have public authority set to *USE
- We use an in house program to allow/block the call to program based of user roles

A few things to consider:
- If a program present a command line, then the user can do anything. You want to avoid that.
- you probably want the value "use adopted authority" set to *NO. this way, you will be able to handle exception that will surely arise (like a program that present a command line).
- You may also want to investigate Access List if you ever need to give access outside of program (to download a file to excel for example)
- note that this setup does not work for client/server type of access (ODBC ...). To handle those, we use swap profile. But that is another subject.

This has worked well for over 10 years here.

Hope this help



Denis Robitaille
Chef de service TI – Solution d’entreprise
Infrastructure et opérations

CASCADES CENTRE DES TECHNOLOGIES
412 Marie Victorin
Kingsey falls(Québec) Canada J0A 1B0
Tél : 819 363 6100 Poste :52130
Cell : 819 352 9362


-----Message d'origine-----
De : MIDRANGE-L <midrange-l-bounces@xxxxxxxxxxxx> De la part de a4g atl
Envoyé : 5 octobre 2018 10:08
À : midrange-l@xxxxxxxxxxxx
Objet : Use of adopted profiles

Is there a document that describes how the adopted authority works and maybe best practices? I am reviewing a project to lock the system down and it has been a long time since I last set up a highly secure system.

My plan is to
- revoke all authorities from user libraries, objects and the IFS.
- Grant authority to a group profile.
- The group profile will own all objects.
- Users will have none or limited authority directly.
- When users signon to the menu, the menu program will grant authority whilst using the job. When they sign off, they will have no authority.

Objective:
- Prevent unauthorized access to the system
- There are users on multiple systems accessing this system and its wide open. - Plan to grant authority to objects only where required example read rights to file where a remote system needs to access files to retrieve data and so on.

The same will apply to the IFS.

What are the best practices today? I know some folk don't like this approach but it is one of the cleanest and easiest approaches to implement and maintain.

TIA

Darryl Freinkel
--
This is the Midrange Systems Technical Discussion (MIDRANGE-L) mailing list To post a message email: MIDRANGE-L@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options,
visit: https://lists.midrange.com/mailman/listinfo/midrange-l
or email: MIDRANGE-L-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at https://archive.midrange.com/midrange-l.

Please contact support@xxxxxxxxxxxx for any subscription related questions.

Help support midrange.com by shopping at amazon.com with our affiliate link: http://amzn.to/2dEadiD Cascades - ATTENTION: Ce courriel provient de l'extérieur de l'organisation. Ne pas cliquer sur les liens et ne pas ouvrir les pièces jointes sauf si vous reconnaissez l'expéditeur et que vous êtes sûr que le contenu est légitime.
Cascades - CAUTION: This email is from outside the organization. Do not click on links or open attachments unless you recognize the sender and you are sure the content is safe.


As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.