|
I would agree with your assessment ... Michael Mayer - CMA Consulting. 700 Troy-Schenectady Road Latham, New York 12110 AS400 Administrator - NJ State WIC Program. 518.783.9003 - Office 518.429.2235 - Direct 518.783.5093 - FAX MMayer@xxxxxxx http://www.cma.com -----Original Message----- From: CWilt@xxxxxxxxxxxx [mailto:CWilt@xxxxxxxxxxxx] Sent: Friday, May 14, 2004 1:52 PM To: security400@xxxxxxxxxxxx Subject: RE: [Security400] Authorization List question Mike, The owner is the user I replaced. Interestingly enough, the creation date is 12-19-1989 but the "Created by User" and "Created on System" fields are blank. Here's a list: AUTL1 *AUTL QSYS OT101M - Misc. Master Files AUTL2 *AUTL QSYS ma401m (auth. list) AUTL3 *AUTL QSYS MA000M _-WINSTON'S MKT MAIN OT101M, MA401M, and MA000M are all menus in our home grown package. I am reasonably sure that they while they may have once be used they are not now. Thoughts? Charles > -----Original Message----- > From: Mayer, Michael (CMA Consulting) [mailto:mmayer@xxxxxxx] > Sent: Friday, May 14, 2004 1:37 PM > To: 'Security Administration on the AS400 / iSeries' > Subject: RE: [Security400] Authorization List question > > > Another good way to determine if the auth list is needed if it has no > objects atached to it is to look at the object owner and who > created it. > This should provide insight as to whether it is an IBM related syustem > object or just something a previous associate created but never used. > > Michael Mayer - CMA Consulting. > 700 Troy-Schenectady Road > Latham, New York 12110 > AS400 Administrator - NJ State WIC Program. > 518.783.9003 - Office > 518.429.2235 - Direct > 518.783.5093 - FAX > MMayer@xxxxxxx > http://www.cma.com > > > > > > -----Original Message----- > From: Edwin Davidson [mailto:EDavidson@xxxxxxxxxxxx] > Sent: Friday, May 14, 2004 1:35 PM > To: 'Security Administration on the AS400 / iSeries' > Subject: RE: [Security400] Authorization List question > > > Yes. Example; > > Authorization list . . . . . . . . : WEBLIST > Library . . . . . . . . . . . . : QSYS > Owner . . . . . . . . . . . . . . : WEBUSER > > Document/ > Folder Type Owner Description > > (No objects are secured by this authorization list) > > > This list is used to control who can use this product. > There are no object or paths listed, however. > > > > -----Original Message----- > From: security400-bounces@xxxxxxxxxxxx > [mailto:security400-bounces@xxxxxxxxxxxx]On Behalf Of > CWilt@xxxxxxxxxxxx > Sent: Friday, May 14, 2004 12:18 PM > To: security400@xxxxxxxxxxxx > Subject: [Security400] Authorization List question > > > All, > > Just a quick question about authorization lists: is there any > way for the > list to be used without having objects secured by it? > > I've got some *AUTL floating around that don't list any > objects as being > secured by them. I was going to just delete them, but I > wanted to make sure > there was no possible way they were being used by some process. > > Thanks, > Charles > > > _______________________________________________ > This is the Security Administration on the AS400 / iSeries > (Security400) > mailing list > To post a message email: Security400@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/security400 > or email: Security400-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/security400. > > > > http://www.primeinc.com > ********************************************************************** > This email and any files transmitted with it are confidential > and intended solely for the use of the individual or entity to > whom they are addressed. If you have received this email > in error please reply to the sender of the message. > > The views expressed in this correspondence may not > reflect the views of Prime, Inc. > > This footnote also confirms that this email message has > been scanned for the presence of computer viruses. > ********************************************************************** > > _______________________________________________ > This is the Security Administration on the AS400 / iSeries > (Security400) > mailing list > To post a message email: Security400@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/security400 > or email: Security400-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/security400. > _______________________________________________ > This is the Security Administration on the AS400 / iSeries > (Security400) mailing list > To post a message email: Security400@xxxxxxxxxxxx > To subscribe, unsubscribe, or change list options, > visit: http://lists.midrange.com/mailman/listinfo/security400 > or email: Security400-request@xxxxxxxxxxxx > Before posting, please take a moment to review the archives > at http://archive.midrange.com/security400. > _______________________________________________ This is the Security Administration on the AS400 / iSeries (Security400) mailing list To post a message email: Security400@xxxxxxxxxxxx To subscribe, unsubscribe, or change list options, visit: http://lists.midrange.com/mailman/listinfo/security400 or email: Security400-request@xxxxxxxxxxxx Before posting, please take a moment to review the archives at http://archive.midrange.com/security400.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.