Authorization List in AS/400

85 pts.
Tags:
AS/400 administration
AS/400 Authorization List
What are the drawbacks of Authorization list in AS400?

Answer Wiki

Thanks. We'll let you know when a new response is added.

The only drawback that I am aware of would be maintenance if they were setup with complexity.

Discuss This Question: 6  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • pdraebel
    I would see the fact that an object can only be secured by one authorisation list as the difficult point in using them. You need to have a good starting plan about seperating authorities with authorisation lists, as CharlieBrowne mentioned is that the complexity of your setup is the main drawback. Authorisation lists are nice, but the degree of complexity if your setup will determine the usability/maintainability of your security plan. Use KIS.
    3,100 pointsBadges:
    report
  • Lsivabe
    Fine.. I accept your answer. When we are securing an object by authorization list. The object will be locked. Others can not use that object while specifying the authority. I am having 24*7 object in the production environment. Can I able to secure that object using authorization list or update the authority in the future after it had been secured by authorization list. But I need to secure that object. I cannot stop the usage of that object. Is it the drawback of authorization list ??? What can I do to secure this object ??? Thanks in Advance.
    85 pointsBadges:
    report
  • harisudhan21
    hiya.. please can yu explain it a little clear? little confused i am abt the whole prob
    1,005 pointsBadges:
    report
  • Yorkshireman
    What, precisely, do you wish to secure? - unauthorised viewing of the content? - update of the file content? from specific users from applications ?? Did you research the manuals at ibm.com? Useful stuff in there, and in redbooks too. This topic is too large and has the potential to obstruct processing unless you have a thought through plan - which suggests you need to have done some research, in the context of your own organisations requirements.
    5,580 pointsBadges:
    report
  • DanD
    One primary advantage of autl is that you can add a user or group without getting an exclusive lock on the object. You do need to allocate the object to add the aut.. If a pgm gets and authority error, you can add the user or group and retry the pgm if retry is allowed. If you don't want that profile to have authority to other objects secured by the list, you can use it as a temporary fix until you can allocate the object and add the profile as a new user, then remove it from the autl.
    2,865 pointsBadges:
    report
  • Lovemyi
    When you first attach an authorization list to an object, the object must be allocated exclusively but then after the authorization list is attached, you can add change and remove users from the authorization list at any time without needing to get an exclusive lock on the objects assigned to that authorization list. That is the biggest advantage over assigning individual authority to the object. Lovemyi
    2,310 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following