Security considerations for objects

When the system accesses an object that you refer to, it checks to determine if you are authorized to use the object and to use it in the way you are requesting.

Generally, you must be authorized at two levels:

Object authority is controlled by the system's security functions, which include the following:

Special considerations apply when writing a program that must be secure (for example, a program that adopts the security officer's user profile).

Related concepts
Libraries
Related tasks
Specify authority for libraries
Related information
iSeries Security Reference PDF