Create an authorization list

This article describes the task, create an authorization list, explains why it is important, and provides step-by-step instructions.

After you set up ownership and public authority, you are ready to set up authorization lists. Using information from your Authorization List forms, create any authorization lists that are necessary to secure the library.

Use the Create Authorization List (CRTAUTL) command:
  1. Type CRTAUTL and press F4 (Prompt).
  2. Fill in the information from your Authorization List form.
  3. Press F10 (Additional parameters).
  4. Use the authority parameter to specify the public authority for objects that are secured by the list.
  5. Check for confirmation messages.
Possible error Recovery
You typed the name of the list incorrectly. You cannot change the name of a list, once the system has created it. Delete the list (DLTAUTL) and try again.
You forgot to specify the public authority for the list. Use the Edit Authorization List (EDTAUTL) command.
To use this function, perform the following steps:
  1. From iSeries™ Navigator, expand your server Security. You will see Authorization Lists and Policies.
  2. Right-click Authorization Lists and select New Authorization List. The New Authorization List allows you to do the following:
    • Use: Allows access to the object attributes and use of the object. The public may view, but not change the objects.
    • Change: Allows the contents of the object, with some exceptions, to be changed.
    • All: Allows all operations on the object, except those that are limited to the owner. The user or group can control the object’s existence, specify the security for the object, change the object, and perform basic functions on the object. The user or group can also change ownership of the object.
    • Exclude: All operations on the object are prohibited. No access or operations are allowed to the object for the users and groups having this permission. Specifies the public is not allowed to use the object.
When working with authorization lists you will want to grant permissions for both objects and data.
Object permissions you can choose are: Data permissions you can choose are:

You can now secure objects with an authorization list.

Related concepts
Authorization lists