×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
On 05-Aug-2014 16:35 -0500, Nathan Andelin wrote:
<<SNIP>> What file permissions? I don't know. I would try running
chgaut with subtree(*all) to grant authority to any directory-tree
that contained perl scripts. If that didn't fix the problem then
grant authority to any directory-tree containing perl object code.
Ugh! :-( If the solution must be so easy, so as to avoid doing the
legwork required to find and implement a proper fix, then surely much
easier... would be to just grant the special authority (SPCAUT) of
*ALLOBJ to the user(s); offered as an at least somewhat sardonic reply,
though seriously, a possibly much better [temporary] resolution.
Certainly much easier to reverse the CHGUSRPRF for a user that
previously did not have the special authority, than to reset the
proper\expected authority to each object generically granted some [quite
possibly undesirable] authorities. Of course reviewing for the T-AF
audit entries [as alluded by Bryan], although possibly tedious, is at
least one way to track down to what resources a job\user is not authorized.
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
[javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.