Bruce,

Thanks, good example.

Charles


> -----Original Message-----
> From: Bruce Vining [mailto:bvining@xxxxxxxxxx]
> Sent: Friday, May 14, 2004 1:40 PM
> To: Security Administration on the AS400 / iSeries
> Subject: Re: [Security400] Authorization List question
> 
> 
> 
> Check out system value QUSEADPAUT for an example of using an 
> authorization
> list without caring about what's secured by the list.
> 
> 
> 
>                                                               
>              
>              CWilt@xxxxxxxxxxx                                
>              
>              m                                                
>              
>              Sent by:                                         
>           To 
>              security400-bounc         
> security400@xxxxxxxxxxxx            
>              es@xxxxxxxxxxxx                                  
>           cc 
>                                                               
>              
>                                                               
>      Subject 
>              05/14/2004 12:18          [Security400] 
> Authorization List    
>              PM                        question               
>              
>                                                               
>              
>                                                               
>              
>              Please respond to                                
>              
>                  Security                                     
>              
>              Administration on                                
>              
>                 the AS400 /                                   
>              
>                   iSeries                                     
>              
>                                                               
>              
>                                                               
>              
> 
> 
> 
> 
> All,
> 
> Just a quick question about authorization lists: is there any 
> way for the
> list to be used without having objects secured by it?
> 
> I've got some *AUTL floating around that don't list any 
> objects as being
> secured by them.  I was going to just delete them, but I 
> wanted to make
> sure
> there was no possible way they were being used by some process.
> 
> Thanks,
> Charles
> 
> 
> _______________________________________________
> This is the Security Administration on the AS400 / iSeries 
> (Security400)
> mailing list
> To post a message email: Security400@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/security400
> or email: Security400-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/security400.
> 
> 
> 
> 
> _______________________________________________
> This is the Security Administration on the AS400 / iSeries 
> (Security400) mailing list
> To post a message email: Security400@xxxxxxxxxxxx
> To subscribe, unsubscribe, or change list options,
> visit: http://lists.midrange.com/mailman/listinfo/security400
> or email: Security400-request@xxxxxxxxxxxx
> Before posting, please take a moment to review the archives
> at http://archive.midrange.com/security400.
> 

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.