|
David, Good point. A quick look using Hawkeye show's no references to them. Charles > -----Original Message----- > From: David Morris [mailto:David.Morris@xxxxxxxxxxxxx] > Sent: Friday, May 14, 2004 1:47 PM > To: security400@xxxxxxxxxxxx > Subject: Re: [Security400] Authorization List question > > > Charles, > > It is possible that someone might be using an authority list to > programmatically control authority. In that case you would likely have > code somewhere that does something like a CHKOBJ command to the > authority list. > > David Morris > > >>> CWilt@xxxxxxxxxxxx 5/14/2004 11:18:03 AM >>> > All, > > Just a quick question about authorization lists: is there any way for > the > list to be used without having objects secured by it? > > I've got some *AUTL floating around that don't list any objects as > being > secured by them. I was going to just delete them, but I > wanted to make > sure > there was no possible way they were being used by some process. > > Thanks, > Charles > _______________________________________________ > This is the Security Administration on the AS400 / iSeries > (Security400) mailing list > To post a message email: Security400@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/security400 > or email: Security400-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/security400. >
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.