|
Mike wrote:_______________________________________________
We have a user browsing through the files on the system through Crystalconnection?
Reports. Is there a way to lock down what they see through that
I know object security can fix the problem, but we are looking to see ifwe
can apply a bandaid until we can setup a proper security scheme.
I'm pretty sure you can do this with an exit program. There are also
third party apps that use exit programs to provide good security.
david
--
IBM System i - For when you can't afford to be out of business
_______________________________________________
This is the Security Administration on the AS400 / iSeries (Security400)
mailing list
To post a message email: Security400@xxxxxxxxxxxx
To subscribe, unsubscribe, or change list options,
visit: http://lists.midrange.com/mailman/listinfo/security400
or email: Security400-request@xxxxxxxxxxxx
Before posting, please take a moment to review the archives
at http://archive.midrange.com/security400.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.