ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzal2_5.4.0.1/rzal2authlist.htm

57 lines
4.2 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Authorization lists" />
<meta name="abstract" content="The task of granting each user authority to every separate object to which the user needs access can be time-consuming and complex. You can simplify this process by creating authorization lists that specify groups of objects. Users and groups can then be authorized to this list, granting them authority to everything that list contains." />
<meta name="description" content="The task of granting each user authority to every separate object to which the user needs access can be time-consuming and complex. You can simplify this process by creating authorization lists that specify groups of objects. Users and groups can then be authorized to this list, granting them authority to everything that list contains." />
<meta name="DC.Relation" scheme="URI" content="rzal2settingsecurity.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rzal2authlist" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Authorization lists</title>
</head>
<body id="rzal2authlist"><a name="rzal2authlist"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Authorization lists</h1>
<div><p>The task of granting each user authority to every separate object
to which the user needs access can be time-consuming and complex.
You can simplify this process by creating authorization lists that specify
groups of objects. Users and groups can then be authorized to this list, granting
them authority to everything that list contains.</p>
<p>Providing each user with explicit access to every object they need to work
with might create a great deal of duplicated effort, since many users need
to access the same group of objects. A much easier way to provide this access
is to create authorization lists. Authorization lists consist of a list of
users or groups, the type of authority (use, change, and exclude) for each
user or group, and a list of objects that this list provides access to.</p>
<p>To work with authorization lists, open <span class="uicontrol">Security</span> in iSeries™ Navigator
and select <span class="uicontrol">Authorization lists</span>.</p>
<p>For example, an authorization list can be created to contain a list of
objects related to an inventory database. A user responsible for ordering
new inventory items can be granted authority to see the contents of the database
objects. Additionally, a user group in shipping and receiving needs to update
this database as parts come in and out of stock. This group can have authority
to change the contents of the objects.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzal2settingsecurity.htm" title="The operating system determines which resources users might access based on information in their user profiles and the security strategy implemented for this system. Learn about security settings and how to manage user authorities efficiently.">Security and user authority</a></div>
</div>
</div>
</body>
</html>