× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.


  • Subject: RE: Checking User's Authority to Files in Root File System
  • From: "Sal Stangarone Jr." <sals@xxxxxxxxxxxxxxxxxxxx>
  • Date: Wed, 28 Mar 2001 13:01:46 -0600
  • Importance: Normal

DSPAUT should do the trick!
 
 
-----Original Message-----
From: owner-rpg400-l@midrange.com [mailto:owner-rpg400-l@midrange.com]On Behalf Of Gordon R. Robinson IV
Sent: Wednesday, March 28, 2001 11:40 AM
To: RPG400-L@midrange.com
Subject: RE: Checking User's Authority to Files in Root File System

As far as I can tell, the DSPOBJAUT command will only show you the authority to objects in the QSYS.LIB file system.  I need to check the users authority to objects in the Root file system.  Also, instead of returning a list of users who are authorized to the file, I would like just to be told if the user, that I provide to the command or API, is authorized (Yes or No).  That way I don't have to sort through a list of authorized users and I don't have to worry if the user is authorized through a group name instead of a user name.
 
Thanks.

DSPOBJAUT will show you what authority a user has to most anything. You can
also specify an OUTFILE to keep the data in if you want to check it and
perform a routine based on their authority.

Bill

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.