ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzamv_5.4.0.1/rzamvworkseccommands.htm

156 lines
8.8 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Work with security commands" />
<meta name="abstract" content="This article describes how use security commands to display, change, and delete security information." />
<meta name="description" content="This article describes how use security commands to display, change, and delete security information." />
<meta name="DC.Relation" scheme="URI" content="rzamvmanagesecinfo.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="workseccommands" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Work with security commands</title>
</head>
<body id="workseccommands"><a name="workseccommands"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Work with security commands</h1>
<div><p>This article describes how use security commands to display, change,
and delete security information.</p>
<div class="p">The table below shows what commands you use to work with security objects
on the system. You can use these commands to perform these tasks: <ul><li>View and list security information.</li>
<li>Change security information.</li>
<li>Delete security information.</li>
</ul>
</div>
<div class="tablenoborder"><table cellpadding="4" cellspacing="0" summary="" width="100%" frame="border" border="1" rules="all"><caption>Table 1. Security Commands</caption><thead align="left"><tr><th valign="top" id="d0e32">Security Object</th>
<th valign="top" id="d0e34">How to View</th>
<th valign="top" id="d0e36">How to Change</th>
<th valign="top" id="d0e38">How to Delete</th>
</tr>
</thead>
<tbody><tr><td valign="top" headers="d0e32 ">System Value</td>
<td valign="top" headers="d0e34 ">WRKSYSVAL DSPSYSVAL</td>
<td valign="top" headers="d0e36 ">WRKSYSVAL CHGSYSVAL</td>
<td valign="top" headers="d0e38 ">Cannot be deleted</td>
</tr>
<tr><td valign="top" headers="d0e32 ">Job Description</td>
<td valign="top" headers="d0e34 ">WRKJOBD DSPJOBD</td>
<td valign="top" headers="d0e36 ">WRKJOBD CHGJOBD</td>
<td valign="top" headers="d0e38 ">DLTJOBD</td>
</tr>
<tr><td valign="top" headers="d0e32 ">Group Profile</td>
<td valign="top" headers="d0e34 ">WRKUSRPRF DSPUSRPRF DSPAUTUSR</td>
<td valign="top" headers="d0e36 ">WRKUSRPRF CHGUSRPRF</td>
<td valign="top" headers="d0e38 ">DLTUSRPRF<sup>1</sup>, <sup>2</sup></td>
</tr>
<tr><td valign="top" headers="d0e32 ">User Profile</td>
<td valign="top" headers="d0e34 ">WRKUSRPRF DSPUSRPRF DSPAUTUSR</td>
<td valign="top" headers="d0e36 ">WRKUSRPRF CHGUSRPRF CHGUSRAUD</td>
<td valign="top" headers="d0e38 ">DLTUSRPRF<sup>1</sup></td>
</tr>
<tr><td valign="top" headers="d0e32 ">Object Authorities</td>
<td valign="top" headers="d0e34 ">DSPAUT DSPOBJAUT DSPUSRPRF TYPE(*OBJAUT)</td>
<td valign="top" headers="d0e36 ">CHGAUT EDTOBJAUT GRTOBJAUT WRKAUT</td>
<td valign="top" headers="d0e38 ">EDTOBJAUT RVKOBJAUT WRKAUT</td>
</tr>
<tr><td valign="top" headers="d0e32 ">Object Ownership</td>
<td valign="top" headers="d0e34 ">WRKOBJOWN DSPOBJAUT DSPUSRPRF TYPE(*OBJOWN)</td>
<td valign="top" headers="d0e36 ">CHGOBJOWN CHGOWN</td>
<td valign="top" headers="d0e38 ">CHGOBJOWN CHGOWN allows you to revoke the rights of
the previous owner.</td>
</tr>
<tr><td valign="top" headers="d0e32 ">Primary Group</td>
<td valign="top" headers="d0e34 ">DSPOBJAUT WRKOBJPGP DSPUSRPRF TYPE(*OBJPGP)</td>
<td valign="top" headers="d0e36 ">CHGOBJPGP CHGPGP</td>
<td valign="top" headers="d0e38 ">CHGOBJPGP CHGPGP set primary group to *NONE</td>
</tr>
<tr><td valign="top" headers="d0e32 ">Object Auditing</td>
<td valign="top" headers="d0e34 ">DSPOBJD</td>
<td valign="top" headers="d0e36 ">CHGOBJAUD CHGAUD</td>
<td valign="top" headers="d0e38 ">CHGOBJAUD (set to *NONE) CHGAUD</td>
</tr>
<tr><td valign="top" headers="d0e32 ">Authorization List</td>
<td valign="top" headers="d0e34 ">DSPAUTL DSPAUTLOBJ</td>
<td valign="top" headers="d0e36 ">EDTAUTL (user authority to a list) EDTOBJAUT (object
secured by list) ADDAUTLE CHGAUTLE GRTOBJAUT</td>
<td valign="top" headers="d0e38 ">DLTAUTL (entire list)<sup>3</sup> RMVAUTLE (remove user
authority to the list) EDTOBJAUT (object secured by list) RVKOBJAUT</td>
</tr>
<tr><td colspan="4" valign="top" headers="d0e32 d0e34 d0e36 d0e38 "><ol><li>IBM<sup>®</sup> recommends
using the remove option from the Work with User Enrollment display for deleting
a profile. Using this option, you can delete any objects that are owned by
the profile or reassign them to a new owner. Certain DLTUSRPRF command parameters
allow you to delete all objects that are owned by the user or assign them
all to a new owner. You cannot delete a profile unless you delete or reassign
owned objects. You also cannot delete a profile that is the primary group
for any objects.</li>
<li>You cannot delete a group profile that has any members. Use the *GRPMBR
option of the DSPUSRPRF command to list the members of the group. Change the
Group Profile field in each of the individual group profiles before deleting
the group profile.</li>
<li>You cannot delete an authorization list that is used to secure objects.
Use the DSPAUTLOBJ command to list the objects that are secured by the list.
Change the authority of any objects that are secured by the list by using
the EDTOBJAUT command.</li>
</ol>
</td>
</tr>
</tbody>
</table>
</div>
<p><strong>Viewing and listing security information</strong></p>
<p>You can list security information by using a display (DSP) command with
a print (*PRINT) option. For example, to display an authorization list called
MYLIST, type <samp class="codeph">DSPAUTL MYLIST *PRINT</samp>. </p>
<p>Some display commands provide options for different types of lists. For
example, when you created individual user profiles, you used the *GRPMBR option
of the DSPUSRPRF command to list all the members of a group profile. Use prompting
(F4) and online information to find out what lists are available for security
objects. </p>
<p>You can use the Display commands to view security information at your display
station. You can also use the Work with... (WRK) commands, which provide more
function. The Work With... commands give you a list display. You can use this
display to change, delete, and view information. </p>
<p>You can also use security commands to list or view information by using
a generic name. If you type <samp class="codeph">WRKUSRPRF DPT*</samp>, your Work with
User Enrollment display or Work with User Profile display shows only profiles
that start with the characters <em>DPT</em>. Use online information for a command
to find out which parameters allow generic names.</p>
<p><strong>Changing security information</strong></p>
<p>You can change security information interactively by using a Work With...
(WRK) or Edit... (EDT) command. You can view the information, change it, and
view the information again after the change.</p>
<p>You can also change security information without viewing it before and
after the change by using a Change... (CHG) or Grant... (GRT) command. This
method is particularly useful for making a change to more than one object
at a time. For example, you used the GRTOBJAUT command to set public authority
for all the objects in a library. </p>
<p><strong>Deleting security information</strong></p>
<p>You can delete or remove certain types of security information interactively
by using the Work with... (WRK) or Edit... (EDT) commands. You can also use
Delete... (DLT), Remove... (RMV), and Revoke... (RVK) commands to delete security
information. Often, you must meet certain conditions before the system allows
you to delete security information.</p>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzamvmanagesecinfo.htm" title="This article describes the tasks for managing security information.">Manage security information</a></div>
</div>
</div>
</body>
</html>