Check out system value QUSEADPAUT for an example of using an authorization list without caring about what's secured by the list. CWilt@xxxxxxxxxxx m Sent by: To security400-bounc security400@xxxxxxxxxxxx es@xxxxxxxxxxxx cc Subject 05/14/2004 12:18 [Security400] Authorization List PM question Please respond to Security Administration on the AS400 / iSeries All, Just a quick question about authorization lists: is there any way for the list to be used without having objects secured by it? I've got some *AUTL floating around that don't list any objects as being secured by them. I was going to just delete them, but I wanted to make sure there was no possible way they were being used by some process. Thanks, Charles _______________________________________________ This is the Security Administration on the AS400 / iSeries (Security400) mailing list To post a message email: Security400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/security400 or email: Security400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/security400.
As an Amazon Associate we earn from qualifying purchases.
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.