There are two types of CIM operations that require user authorization.
Operations that change the local CIM schema are controlled in application administration, whereas operations that change the i5/OS™ system objects are controlled using object authorities in i5/OS.