Q
Manage Learn to apply best practices and optimize your operations.

Using two different authorization lists

I have a physical file with a logical file on that physical file. Is it possible to put different authorization lists on the physical and logical files? I have tied different lists to each but when the users (with ODBC) try to connect to the logical file; they get an error saying that they do not have access to the physical file.

Is there something on the CRTLFM command that will remedy this, or does the fact that the logical is just a view require that users have access to both?
I don't believe that the issue is that you're trying to use two different authorization lists. I believe the issue is insufficient authority to the underlying physical file. To access a file via a logical file the user must have the same data authority on the logical file as they do to the physical file. What some people do is grant a specific group profile or perhaps *PUBLIC authority all data rights to the physical file, then grant the corresponding data rights to the logical file. Do NOT give *OBJOPR authority to the physical file as that will let the user access the physical file directly.

==================================
MORE INFORMATION ON THIS TOPIC
==================================

The Best Web Links: tips, tutorials and more.

Search400's targeted search engine: Get relevant information on security.

Ask your systems management questions--or help out your peers by answering them--in our live discussion forums.

Check out this Search400.com Featured Topic: Top ten security tips


This was last published in October 2004

Dig Deeper on iSeries system and application security

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

Close