Authorization lists

The task of granting each user authority to every separate object to which the user needs access can be time-consuming and complex. You can simplify this process by creating authorization lists that specify groups of objects. Users and groups can then be authorized to this list, granting them authority to everything that list contains.

Providing each user with explicit access to every object they need to work with might create a great deal of duplicated effort, since many users need to access the same group of objects. A much easier way to provide this access is to create authorization lists. Authorization lists consist of a list of users or groups, the type of authority (use, change, and exclude) for each user or group, and a list of objects that this list provides access to.

To work with authorization lists, open Security in iSeries™ Navigator and select Authorization lists.

For example, an authorization list can be created to contain a list of objects related to an inventory database. A user responsible for ordering new inventory items can be granted authority to see the contents of the database objects. Additionally, a user group in shipping and receiving needs to update this database as parts come in and out of stock. This group can have authority to change the contents of the objects.