Manta alt

YOUR IBM i TRAINING SOURCE

You must allow the browser to execute JavaScript programs if you want to view product information. If your browser is set up to execute JavaScript programs, the problem is that the product ID was incorrect. Use the menu bar above to find the desired product.

Overview

Audio

In this course, you will see how to grant users the authority to access the objects that you own or control.

The first session covers public authority, the right that any user has to an object. As you will see, public authority is specified for an object when it is created and can be changed later by the object's owner.

In the second and third sessions, you will see how to grant private authority to an object. Private authority allows a user to access an object in ways not available to a general user. Objects stored in both libraries and directories are discussed.

The final session of this course covers how to transfer the ownership of an object to another user.

You will be able to use the commands covered in this course if you are the owner of the object or if you have sufficient authority. For example, you might be the security officer with *ALLOBJ authority.

Approximate Study Time: 90 minutes

Objectives

After completing this course, you should be able to:

  • Specify the public authority for a new object
  • Determine which users can access an object and their respective levels of authority
  • Grant a user the authority to access an object
  • Revoke the authority of a user to access an object
  • Change the level of authority a user has to an object
  • Pass the ownership of an object to another user
  • Document the authority and ownership changes you made during an interactive session by printing your job log

Where appropriate, you will see how to perform these tasks for objects in both the library and root file systems.

Topic Outline

Defining Public Authority

Granting Private Authority

Securing IFS Objects

Changing Object Ownership

Audience

The course is intended for security officers and other personnel who are responsible for designing and implementing a system security plan. The audience also includes system administrators, programmers, managers, and users who will participate in security planning for the system as a whole or for one or more applications.

Prerequisites

This course assumes that you are familiar with the concepts and basic operations of IBM i systems. You can satisfy these prerequisites by successfully completing the courses in the following series:

Finally, the course assumes that you have an understanding of IBM i security concepts. You can satisfy this prerequisite by successfully completing the first course of this series:

You may also have obtained these skills by taking other courses or through relevant work experience.