× The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.



Check out system value QUSEADPAUT for an example of using an authorization
list without caring about what's secured by the list.



                                                                           
             CWilt@xxxxxxxxxxx                                             
             m                                                             
             Sent by:                                                   To 
             security400-bounc         security400@xxxxxxxxxxxx            
             es@xxxxxxxxxxxx                                            cc 
                                                                           
                                                                   Subject 
             05/14/2004 12:18          [Security400] Authorization List    
             PM                        question                            
                                                                           
                                                                           
             Please respond to                                             
                 Security                                                  
             Administration on                                             
                the AS400 /                                                
                  iSeries                                                  
                                                                           
                                                                           




All,

Just a quick question about authorization lists: is there any way for the
list to be used without having objects secured by it?

I've got some *AUTL floating around that don't list any objects as being
secured by them.  I was going to just delete them, but I wanted to make
sure
there was no possible way they were being used by some process.

Thanks,
Charles


_______________________________________________
This is the Security Administration on the AS400 / iSeries (Security400)
mailing list
To post a message email: Security400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/security400
or email: Security400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/security400.





As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.