Manage Learn to apply best practices and optimize your operations.

Change object authority to include *USE authority

I need to change a couple thousands of objects' authority to include *USE authority for a user group. These objects reside in four libraries. I could apply EDTOBJAUT command on every object. But it's painfully slow and tedious. Any ways of changing authority at the library level and propagate authority changes to all objects under the library?

You might try doing a DSPOBJD of all the objects in the library to an outfile, then grant the authority that way. You might also consider securing the objects with an authorization list. Then grant the group's authority to the authorization list. Then change the Creation Authority (CRTAUT) value of the library and name the authorization list. When any new object is created into the library, it will automatically be secured with the authorization list. Note: Changing the library's CRTAUT value will not change the authority of existing objects - just newly created ones.


The Best Web Links: Tips, tutorials and more.

Search400's targeted search engine: Get relevant information on security.

Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.

Read this Search400 Featured Topic: Secure your iSeries

This was last published in August 2002

Dig Deeper on iSeries system and application security

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.



  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...