|
Check out system value QUSEADPAUT for an example of using an authorization list without caring about what's secured by the list. CWilt@xxxxxxxxxxx m Sent by: To security400-bounc security400@xxxxxxxxxxxx es@xxxxxxxxxxxx cc Subject 05/14/2004 12:18 [Security400] Authorization List PM question Please respond to Security Administration on the AS400 / iSeries All, Just a quick question about authorization lists: is there any way for the list to be used without having objects secured by it? I've got some *AUTL floating around that don't list any objects as being secured by them. I was going to just delete them, but I wanted to make sure there was no possible way they were being used by some process. Thanks, Charles _______________________________________________ This is the Security Administration on the AS400 / iSeries (Security400) mailing list To post a message email: Security400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/security400 or email: Security400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/security400.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.