Overview

In this course, you will see how to grant users the authority to access the objects that you own or control.
The first session covers public authority, the right that any user has to an object. As you will see, public authority is specified for an object when it is created and can be changed later by the object's owner.
In the second and third sessions, you will see how to grant private authority to an object. Private authority allows a user to access an object in ways not available to a general user. Objects stored in both libraries and directories are discussed.
The final session of this course covers how to transfer the ownership of an object to another user.
You will be able to use the commands covered in this course if you are the owner of the object or if you have sufficient authority. For example, you might be the security officer with *ALLOBJ authority.
Approximate Study Time: 90 minutes
Objectives
After completing this course, you should be able to:
- Specify the public authority for a new object
- Determine which users can access an object and their respective levels of authority
- Grant a user the authority to access an object
- Revoke the authority of a user to access an object
- Change the level of authority a user has to an object
- Pass the ownership of an object to another user
- Document the authority and ownership changes you made during an interactive session by printing your job log
Where appropriate, you will see how to perform these tasks for objects in both the library and root file systems.
Topic Outline
Defining Public Authority
Granting Private Authority
Securing IFS Objects
Changing Object Ownership
Audience
The course is intended for security officers and other personnel who are responsible for designing and implementing a system security plan. The audience also includes system administrators, programmers, managers, and users who will participate in security planning for the system as a whole or for one or more applications.
Prerequisites
This course assumes that you are familiar with the concepts and basic operations of IBM i systems. You can satisfy these prerequisites by successfully completing the courses in the following series:
Finally, the course assumes that you have an understanding of IBM i security concepts. You can satisfy this prerequisite by successfully completing the first course of this series:
You may also have obtained these skills by taking other courses or through relevant work experience.
Overview
|
Courses
|
Options
|
Combo Packs
|
Technical
|
Orders
|
Legal
|
Contact Us
|
Search
|
Glossary
© Copyright 2023 Manta Technologies. All Rights Reserved.