IBM Security
IBM Security
IBM Security
ERserver
iSeries
Security Reference
Version 5
SC41-5302-06
ERserver
iSeries
Security Reference
Version 5
SC41-5302-06
Note
Before using this information and the product it supports, be sure to read the information in
Appendix H, Notices on page 611.
Contents
Figures . . . . . . . . . . . . . . . ix
Tables . . . . . . . . . . . . . . . xi
About Security - Reference (SC41-5302) xv
Who should read this book . . . .
Conventions and terminology used in
Prerequisite and related information .
iSeries Navigator . . . . . .
How to send your comments . . .
. . . .
this book .
. . . .
. . . .
. . . .
.
.
.
.
. xv
xvi
xvi
xvi
xvi
Physical Security . . . .
Keylock Security . . . .
Security Level . . . . .
System Values . . . . .
Signing . . . . . . .
Single sign-on enablement .
User Profiles . . . . .
Group Profiles . . . . .
Resource Security . . . .
Security Audit Journal . .
C2 Security . . . . . .
Independent disk pool . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2
2
2
3
3
3
4
5
5
6
6
7
Security Level 10 . . . . . . . . . . .
Security Level 20 . . . . . . . . . . .
Changing to Level 20 from Level 10 . . . .
Changing to Level 20 from a Higher Level . .
Security Level 30 . . . . . . . . . . .
Changing to Level 30 from a Lower Level . .
Security Level 40 . . . . . . . . . . .
Preventing the Use of Unsupported Interfaces .
Protecting Job Descriptions . . . . . . .
Signing On without a User ID and Password .
Enhanced Hardware Storage Protection . . .
Protecting a Programs Associated Space . .
Protecting a Jobs Address Space . . . . .
Validating Parameters . . . . . . . . .
Validation of Programs Being Restored . . .
Changing to Security Level 40 . . . . . .
Disabling Security Level 40 . . . . . . .
Security Level 50 . . . . . . . . . . .
Restricting User Domain Objects . . . . .
Restricting Message Handling . . . . . .
Preventing Modification of Internal Control
Blocks . . . . . . . . . . . . . .
Changing to Security Level 50 . . . . . .
Disabling Security Level 50 . . . . . . .
Copyright IBM Corp. 1996, 2002
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
12
12
12
13
13
13
14
15
16
16
16
17
17
17
17
18
19
19
19
20
. 20
. 21
. 21
23
25
25
26
27
28
29
29
30
31
32
32
33
34
35
36
36
37
38
38
39
39
42
43
44
46
46
48
49
49
50
51
51
52
52
53
58
58
59
60
61
61
iii
iv
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 63
. 63
. 64
. 66
. 66
. 68
. 69
. 69
. 70
. 71
. 72
. 73
. 73
. 75
. 75
. 80
. 82
. 82
. 83
. 83
. 84
. 85
. 86
. 87
. 88
. 88
. 89
. 89
. 90
. 91
. 91
. 92
. 92
. 93
. 93
. 94
. 95
. 96
. 96
. 96
. 97
. 97
. 98
. 98
. 99
. 99
. 100
. 100
. 101
. 102
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
103
103
103
103
103
104
104
107
109
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
109
112
112
113
114
115
116
116
116
119
120
121
123
123
123
125
126
126
127
128
128
128
129
130
130
131
135
138
139
139
140
140
141
141
144
144
145
146
149
151
152
153
153
153
156
156
173
184
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
185
185
186
187
187
189
190
190
191
191
192
193
193
194
195
195
196
196
197
197
199
200
200
201
201
202
203
203
203
204
205
. 208
. 209
. 210
. 210
. 212
. 212
. 213
214
. 215
. 216
. 217
. 218
. 222
. 222
. 223
. 224
. 224
. 227
. 227
. 227
. 228
. 229
. 229
. 229
230
. 230
. 231
. 232
. 232
. 232
. 233
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
236
236
237
237
238
241
241
242
243
244
244
245
.
.
.
.
.
.
.
.
.
.
.
.
247
248
248
249
249
250
250
251
252
252
252
253
. 267
. 267
.
.
.
.
.
.
.
.
.
.
269
272
272
275
276
276
276
277
279
279
280
. 280
vi
311
311
313
319
319
319
320
320
321
322
323
323
324
324
324
325
325
326
326
326
327
328
328
330
331
332
332
334
335
335
335
336
336
337
340
341
341
341
342
349
350
350
351
351
351
367
368
368
368
369
371
372
372
373
376
376
383
386
387
387
389
389
390
390
391
392
392
393
393
393
394
394
395
396
396
397
398
399
399
399
400
400
401
404
405
405
410
411
411
412
415
416
417
417
418
418
418
419
423
423
423
426
427
427
429
430
431
431
431
433
434
435
436
436
439
.
.
.
.
.
.
. 439
. 440
. 440
599
601
603
607
607
609
609
610
Trademarks .
. 613
. 615
. 615
615
. 615
. 615
. 616
. 616
.
.
.
.
.
.
.
.
.
616
616
616
616
616
616
617
617
617
Index . . . . . . . . . . . . . . . 619
Contents
vii
viii
Figures
|
|
|
|
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
| 12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
|
|
|
|
|
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
164
167
169
. 170
.
.
.
.
.
.
.
.
.
.
.
.
.
172
173
174
178
179
180
181
182
182
188
194
195
208
215
217
218
218
219
. 219
221
222
. 225
ix
Tables
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
50
50
51
51
52
52
52
53
53
54
59
60
60
61
62
67
68
69
70
71
71
72
72
73
73
73
74
75
75
78
80
82
83
83
84
85
86
86
87
87
xi
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.
93.
94.
95.
96.
97.
98.
99.
100.
101.
102.
103.
104.
105.
106.
107.
108.
109.
110.
111.
112.
113.
114.
115.
116.
117.
118.
119.
120.
121.
122.
123.
xii
. 88
. 89
. 89
. 90
. 90
. 91
. 91
. 92
. 92
. 93
. 93
. 94
. 94
. 95
. 95
. 95
. 95
. 96
. 96
. 97
. 97
. 98
. 98
. 99
. 99
. 100
. 100
. 101
. 101
102
. 102
. 120
. 121
. 122
. 122
. 165
. 166
. 194
. 199
. 219
. 219
. 223
225
. 231
. 235
. 254
. 255
. 264
. 283
. 283
. 284
285
286
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
287
287
287
288
288
289
289
289
290
291
293
299
309
310
311
401
436
501
503
504
504
506
508
512
513
513
516
516
518
519
520
521
523
524
528
530
530
531
533
534
535
536
538
539
542
544
545
546
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
546
547
547
550
553
554
555
556
556
558
560
561
562
563
565
565
567
568
568
569
570
571
572
575
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
578
579
581
581
582
582
583
583
584
586
586
587
587
588
589
593
593
594
595
596
597
599
601
603
607
608
610
610
576
577
Tables
xiii
xiv
xv
iSeries Navigator
IBM iSeries Navigator is a powerful graphical interface for managing your iSeries
systems that is a component of iSeries Access for Windows.. iSeries Navigator
functionality includes system navigation, configuration, planning capabilities, and
online help to guide you through your tasks. iSeries Navigator makes operation
and administration of the server easier and more productive and is the only user
interface to the new, advanced features of the OS/400 operating system. It also
includes Management Central for managing multiple servers from a central server.
For more information on iSeries Navigator, see the Information Center.
xvi
v If you prefer to send comments by mail, use the readers comment form with the
address that is printed on the back. If you are mailing a readers comment form
from somewhere other than the United States, you can give the form to the local
IBM branch office or IBM representative for postage-paid mailing.
v If you prefer to send comments by FAX, use either of the following numbers:
United States and Canada: 1-800-937-3430
Other countries: 1-507-253-5192
v If you prefer to send comments electronically, use this network ID:
IBMMAIL, to IBMMAIL(USIB56RZ)
[email protected]
Be sure to include the following:
v The name of the book.
v The publication number of the book.
v The page number or topic to which your comment applies.
xvii
xviii
|
|
|
|
|
|
|
|
|
|
|
|
There are several enhancements and additions to service tools for this release that
make them easier to use and understand. You can now manage and create service
tools user IDs from system service tools (SST) by selecting option 8 (Work with
service tools user IDs) from the main SST display. You no longer need to go into
dedicated service tools (DST) to reset passwords, grant or revoke privileges, or
create service tools user IDs. Note: Information regarding Service tools has been
moved to the Information Center. The following enhancements have been made to
System service tools (SST):
v Password management enhancements
The server is shipped with limited ability to change default and expired
passwords. This means that you cannot change service tools user IDs that have
default and expired passwords through the Change Service Tools User ID
(QSYCHGDS) API, nor can you change their passwords through SST. You can
only change a service tools user ID with a default and expired password
through DST. And, you can change the setting to allow default and expired
passwords to be changed. Also, you can use the new Start service tools (STRSST)
privilege to create a service tools user ID that can access DST, but can be
restricted from accessing SST.
v Terminology changes
The textual data and other documentation have been changed to reflect the new
service tools terminology. Specifically, the term service tools user IDs replaces
previous terms, such as DST user profiles, DST user IDs, service tools user
profiles, or variations of these names.
|
|
|
For information on how to work with Service tools, see the Information Center (see
Prerequisite and related information on page xvi for details) topic, Service tools
(Security>Service tools).
|
|
|
|
|
|
|
|
|
|
|
There is a new outfile format, TYPE5, for the security audit journal. All new fields
in existing records will only be added to the TYPE5 outfiles, and new audit records
will only have TYPE5 outfiles. When you display the security audit journal, you
can specify *TYPE5 as the outfile format for the journal. TYPE5 outfiles include
remote IP information and thread IDs in the header portion of the security audit
records. This data was added to the header portion of the audit record to keep the
size of the records to a minimum. The remote IP information is helpful with
intrusion detection and in determining the source of some actions on your system.
The thread ID is useful for isolating actions within a thread in multi-threaded jobs.
You can find more information about audit journals in Appendix F: in Security
Reference.
|
|
|
If you are using IASPs you need to understand the security implications of using
them. You can find more information about how security affects and is affected by
IASPs in Chapter 1 of Security Reference.
|
|
|
|
|
|
|
|
|
|
|
xix
|
|
|
|
|
|
|
You can now specify a wider range of values for the force conversion on restore
(QFRCCVNRST) system value. The values that you specify for this and two other
system values affect how your system handles restore operations. These three
system values work together to provide options for controlling how trusted an
object must be before it is restored on your system. You can find more information
about the security implications of these system values in Chapter 3 of Security
Reference.
|
|
|
|
|
|
|
|
|
|
|
|
|
System service tools (SST) and dedicated service tools (DST) provide an option that
allows you to prevent changes to a variety of security related system values. If the
value of the Allow change of security related system values option is set to NO,
then the system values cannot be changed by using the Change system value
(CHGSYSVAL) command (or any other user interfaces). Setting this option to NO
is useful, for example, if you have settings for the Verify objects during restore
(QVFYOBJRST) or Allow restore of security-sensitive objects (QALWOBJRST)
system values to control how trusted an object must be before it can be restored.
Selecting NO for this option ensures that applications cannot change these system
value settings during install to values that are less restrictive to install objects that
do not satisfy the settings for these system values. You can find information about
restriction certain system values from being changed in Chapter 3 of Security
Reference.
|
|
|
|
|
|
v Output Queue and Parameter Authorities Required for Printing on page 199
v Planning the Auditing of Object Access on page 263
v Appendix D, Authority Required for Objects Used by Commands on page 309
xx
To facilitate installation, many of the security capabilities on your system are not
activated when your system is shipped. Recommendations are provided in this
book to bring your system to a reasonable level of security. Consider the security
requirements of your own installation as you evaluate the recommendations.
Physical Security
Physical security includes protecting the system unit, system devices, and backup
media from accidental or deliberate damage. Most measures you take to ensure the
physical security of your system are external to the system. However, the system is
equipped with a keylock that prevents unauthorized functions at the system unit.
Note: You must order the keylock feature on some models.
Physical security is described in the Information Center (see Prerequisite and
related information on page xvi for details).
Keylock Security
The keylock on the 940x control panel controls access to various system control
panel functions. The keylock position can be retrieved and changed under program
control by using either of the following:
v Retrieve IPL Attributes (QWCRIPLA) API
v Change IPL Attributes (CHGIPLA) command
This allows the remote user access to additional functions available at the control
panel. For example, it controls where the machine will IPL from and to what
environment, either OS/400 or Dedicated Service Tools (DST).
The OS/400 System Value, QRMTSRVATR, controls the remote access. This value is
shipped defaulted to off which will not allow the keylock to be overridden. The
system value can be changed to allow remote access, but does require *SECADM
and *ALLOBJ special authorities to change.
Security Level
You can choose how much security you want the system to enforce by setting the
security level (QSECURITY) system value. The system offers five levels of security:
Level 10:
Level 10 is no longer supported. See Chapter 2, Using System Security
(QSecurity) System Value on page 9 for information about security levels
(10, 20, 30, 40, and 50).
Level 20:
The system requires a user ID and password for sign-on. All users are
given access to all objects.
Level 30:
The system requires a user ID and password for sign-on. The security of
resources is enforced.
Level 40:
The system requires a user ID and password for sign-on. The security of
resources is enforced. Additional integrity protection features are also
enforced.
Level 50:
The system requires a user ID and password for sign-on. The security of
resources is enforced. Level 40 integrity protection and enhanced integrity
protection are enforced. Security level 50 is intended for iSeries systems
with high security requirements, and it is designed to meet C2 security
requirements.
The system security levels are described in Chapter 2, Using System Security
(QSecurity) System Value on page 9.
System Values
System values allow you to customize many characteristics of your system. A
group of system values are used to define system-wide security settings. For
example, you can specify:
v
v
v
v
The system values that relate to security are described in Chapter 3, Security
System Values on page 23.
Signing
A key component of security is integrity: being able to trust that objects on the
system have not been tampered with or altered. Your operating system software is
protected by digital signatures, and now you can reinforce integrity by signing
software objects which you rely on (for more information on using signing to
protect your system, see Tips and Tools for Securing Your iSeries). This is particularly
important if the object has been transmitted across the internet or stored on media
which you feel might have been modified. The digital signature can be used to
detect if the object has been altered.
Digital signatures, and their use for verification of software integrity, can be
managed according to your security policies using the Verify Object Restore
(QVFYOBJRST) system value, the Check Object Integrity (CHKOBJITG) command,
and the Digital Certificate Manager tool. Additionally, you can choose to sign your
own programs (all licensed programs shipped with the iSeries are signed). DCM is
described in the Information Center (see Prerequisite and related information on
page xvi for details).
|
|
|
|
|
|
|
|
|
|
|
New for V5R2, you can restrict adding digital signatures to a digital certificate
store using the Add Verifier API and restrict resetting passwords on the digital
certificate store. System Service Tools (SST) provides a new menu option, entitled
Work with system security where you can restrict adding digital certificates.
|
|
|
|
|
|
|
|
To enable a single sign-on environment, IBM provides two technologies that work
together to allow users to sign in with their Windows username and password and
be authenticated to iSeries systems in the network. Network authentication service
and Enterprise Identity Mapping (EIM) are the two technologies that an
administrator must configure to enable a single sign-on environment. Windows
2000, XP, AIX, and zSeries use Kerberos protocol to authenticate users to the
network. A secure, centralized server, called a key distribution center, authenticates
principals (Kerberos users) to the network.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
User Profiles
Every system user has a user profile. At security level 10, the system automatically
creates a profile when a user first signs on. At higher security levels, you must
create a user profile before a user can sign on.
The user profile is a powerful and flexible tool. It controls what the user can do
and customizes the way the system appears to the user. Following are descriptions
of a few important security features of the user profile:
Special authority
Special authorities determine whether the user is allowed to perform
system functions, such as creating user profiles or changing the jobs of
other users.
Initial menu and initial program
The initial menu and program determine what the user sees after signing
on the system. You can limit a user to a specific set of tasks by restricting
the user to an initial menu.
Limit capabilities
The limit capabilities field in the user profile determines whether the user
can enter commands and change the initial menu or initial program when
signing on.
User profiles are discussed in Chapter 4, User Profiles on page 63.
Group Profiles
A group profile is a special type of user profile. You can use a group profile to
define authority for a group of users, rather than giving authority to each user
individually. A group profile can own objects on the system. You can also use a
group profile as a pattern when creating individual user profiles by using the copy
profile function.
Planning Group Profiles on page 229 discusses using group authority. Group
Ownership of Objects on page 129 discusses what objects should be owned by
group profiles. Primary Group for an Object on page 130 discusses using primary
group and primary group authority for an object. Copying User Profiles on
page 107 describes how to copy a group profile to create an individual user profile.
Resource Security
Resource security on the system allows you to define who can use objects and how
those objects can be used. The ability to access an object is called authority. You
can specify detailed authorities, such as adding records or changing records. Or
you can use the system-defined subsets of authorities: *ALL, *CHANGE, *USE, and
*EXCLUDE.
Files, programs, and libraries are the most common objects requiring security
protection, but you can specify authority for any object on the system. Following
are descriptions of the features of resource security:
Group profiles
A group of similar users can share the same authority to use objects.
Authorization lists
Objects with similar security needs can be grouped on one list; authority
can be granted to the list rather than to the individual objects.
Object ownership
Every object on the system has an owner. Objects can be owned by an
individual user profile or by a group profile. Proper assignment of object
ownership helps you manage applications and delegate responsibility for
the security of your information.
Primary group
You can specify a primary group for an object. The primary groups
authority is stored with the object. Using primary groups may simplify
your authority management and improve authority checking performance.
Library authority
You can put files and programs that have similar protection requirements
into a library and restrict access to that library. This is often easier than
restricting access to each individual object.
Directory authority
You can use directory authority in the same way that you use library
authority. You can group objects in a directory and secure the directory
rather than the individual objects.
Object authority
In cases where restricting access to a library or directory is not specific
enough, you can restrict authority to access individual objects.
Public authority
For each object, you can define what kind of access is available for any
Chapter 1. Introduction to iSeries Security
system user who does not have any other authority to the object. Public
authority is an effective means for securing information and provides good
performance.
Adopted authority
Adopted authority adds the authority of a program owner to the authority
of the user running the program. Adopted authority is a useful tool when
a user needs different authority for an object, depending on the situation.
Authority holder
An authority holder stores the authority information for a
program-described database file. The authority information remains, even
when the file is deleted. Authority holders are commonly used when
converting from the System/36, because System/36 applications often
delete files and create them again.
Field level authority
Field level authorities are given to individual fields in a database file. This
authority is managed through SQL.
Resource security is described in Chapter 5, Resource Security on page 119
C2 Security
By using security level 50 and following the instructions in the Security - Enabling
for C2, SC41-5303-00, you can bring a Version 4 Release 4 iSeries system to a C2
level of security. C2 is a security standard defined by the U.S. government in the
Department of Defense Trusted System Evaluation Criteria (DoD 5200.28.STD).
In October, 1995, iSeries formally received a C2 security rating from the United
States Department of Defense. The C2 rating is for V2R3 of OS/400, SEU,
Query/400, SQL, and Common Cryptographic Architecture Services/400. The C2
rating was awarded after a rigorous, multi-year period of evaluation. iSeries is the
first system to achieve a C2 rating for a system (hardware and operating system)
with an integrated, full-function database.
In 1999, iSeries received a C2 rating for Version 4 Release 4 of OS/400 (with
feature code 1920), SEU, Query/400, SQL, TCP/IP Utilities, Cryptographic Access
Provider, and Advanced Series Hardware. A limited set of TCP/IP communication
functions between iSeries, attached to a local area network, were included in the
evaluation.
To achieve a C2 rating, a system must meet strict criteria in the following areas:
v Discretionary access control
v User accountability
v Security auditing
v Resource isolation
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Independent disk pools provide the ability to group together storage that can be
taken offline or brought online independent of system data or other unrelated data.
The terms independent auxiliary storage pool (ASP) and independent disk pool are
synonymous. An independent disk pool can be either switchable among multiple
systems in a clustering environment or privately connected to a single system. For
V5R2, functional changes to independent disk pools have security implications on
your system. For example, when you perform a CRTUSRPRF, you can not create a
user profile (*USRPRF) into an independent disk pool. However, when a user is
privately authorized to an object in the independent disk pool, is the owner of an
object on an independent disk pool, or is the primary group of an object on an
independent disk pool, the name of the profile is stored on the independent disk
pool. If the independent disk pool is moved to another system, the private
authority, object ownership, and primary group entries will be attached to the
profile with the same name on the target system. If a profile does not exist on the
target system, a profile will be created. The user will not have any special
authorities and the password will be set to *NONE.
|
|
|
|
|
|
|
Independent disk pools have been enhanced to provide support for library-based
objects. In previous releases, independent disk pools supported user-defined file
systems (UDFS) only. However several objects are not allowed on independent
disk pools. For a complete list of supported and unsupported objects see
Supported and unsupported OS/400 object types topic in the Information Center.
(Systems management>Independent disk pools>Concepts>Restrictions
and considerations>Supported and unsupported OS/400 object types).
No system-enforced security
Note: You cannot set the system value QSECURITY to security level 10.
20
Sign-on security
30
40
50
Your system is shipped at level 40, which provides sign-on and resource security
and provides integrity protection. For more information, see Security Level 40 on
page 14.
If you want to change the security level, use the Work with System Values
(WRKSYSVAL) command. The minimum security level you should use is 30.
However, level 40 or higher is recommended. The change takes effect the next time
you perform an initial program load (IPL). Table 1 compares the levels of security
on the system:
| Table 1. Security Levels: Function Comparison
| Function
Level 20
Level 30
Level 40
Level 50
|
|
|
|
|
|
|
|
Yes
Yes
Yes
Yes1
Yes
No
Yes
No
Yes
Yes
Yes
Yes1
Yes
Yes
No
No
Yes
Yes
Yes
Yes1
Yes
Yes
No
No
Yes
Yes
Yes
Yes1
Yes
Yes
No
No
Level 20
Level 30
Level 40
Level 50
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
No
No
Yes
No
No
No
Yes
Yes
Yes
No
Yes
Yes
Yes
Yes
Yes
No
No
Yes
Yes
No
No
No
Yes
No
No
No
No
Yes
Yes
Yes
Yes
|
|
|
At level 50, more protection of internal control blocks is enforced than at level 40. See Preventing
Modification of Internal Control Blocks on page 20.
The system security level determines what the default special authorities are for
each user class. When you create a user profile, you can select special authorities
based on the user class. Special authorities are also added and removed from user
profiles when you change security levels.
These special authorities can be specified for a user:
*ALLOBJ
All-object special authority gives a user authority to perform all operations
on objects.
*AUDIT
Audit special authority allows a user to define the auditing characteristics
of the system, objects, and system users.
*IOSYSCFG
System configuration special authority allows a user to configure input and
output devices on the system.
*JOBCTL
Job control special authority allows a user to control batch jobs and
printing on the system.
*SAVSYS
Save system special authority allows a user to save and restore objects.
*SECADM
Security administrator special authority allows a user to work with user
profiles on the system.
*SERVICE
Service special authority allows a user to perform software service
functions on the system.
*SPLCTL
Spool control special authority allows unrestricted control of batch jobs and
output queues on the system.
10
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
*SECOFR
All
All
All
All
All
All
All
All
*SECADM
*PGMR
*SYSOPR
*USER
10 or 20
10 or 20
10 or 20
10 or 20
10 or 20
10 or 20
All
10 or 20
10 or 20
All
All
10 or 20
Note: The topics User Class on page 69 and Special Authority on page 75
provide more information about user classes and special authorities.
Recommendations:
Security level 30 or higher is recommended because the system does not
automatically give users access to all resources. At lower security levels, all users
are given *ALLOBJ special authority.
Also, at security level 30 (or below), users are able to call system interfaces that
swap to QSECOFR user profile or allow users access to resources that they would
not normally be allowed to access. At security level 40, users are not allowed to
directly call these interfaces; therefore, security level 40 or higher is strongly
recommended.
Security level 40 provides additional integrity protection without affecting system
performance. Applications that do not run at security level 40 have a negative
affect on performance at security level 30. They cause the system to respond to
domain violations.
Security level 50 is intended for systems with very high security requirements. If
you run your system at security level 50, you may notice some performance
impact because of the additional checking the system performs.
Even if you want to give all users access to all information, consider running your
system at security level 30. You can use the public authority capability to give
11
users access to information. Using security level 30 from the beginning gives you
the flexibility of securing a few critical resources when you need to without having
to test all your applications again.
Security Level 10
At security level 10, you have no security protection; therefore, security level 10 is
not recommended by IBM. Beginning in Version 4 Release 3, you cannot set your
security level to 10. If your system is currently at level 10, your system will remain
at level 10 when you install Version 4 Release 3. If you change the system level to
some other value, you cannot change it back to level 10.
When a new user signs on, the system creates a user profile with the profile name
equal to the user ID specified on the sign-on display. If the same user signs on
later with a different user ID, a new user profile is created. Appendix B shows the
default values that are used when the system automatically creates a user profile.
The system performs authority checking at all levels of security. Because all user
profiles created at security level 10 are given *ALLOBJ special authority, users
successfully pass every authority check and have access to all resources. If you
want to test the effect of moving to a higher security level, you can remove
*ALLOBJ special authority from user profiles and grant those profiles the authority
to use specific resources. However, this does not give you any security protection.
Anyone can sign on with a new user ID, and a new profile is created with
*ALLOBJ special authority. You cannot prevent this at security level 10.
Security Level 20
Level 20 provides the following security functions:
v Both user ID and password are required to sign on.
v Only a security officer or someone with *SECADM special authority can create
user profiles.
v The limit capabilities value specified in the user profile is enforced.
All profiles are created with *ALLOBJ special authority at security level 20 by
default. Therefore, security level 20 is not recommended by IBM.
12
v Review the default values in Table 133 in Appendix B for any changes you want
to make to the profiles automatically created at security level 10.
Security Level 30
Level 30 provides the following security functions, in addition to what is provided
at level 20:
v Users must be specifically given authority to use resources on the system.
v Only user profiles created with the *SECOFR security class are given *ALLOBJ
special authority automatically.
13
Security Level 40
Security level 40 prevents potential integrity or security risks from programs that
could circumvent security in special cases. Security level 50 provides enhanced
integrity protection for installations with strict security requirements. Table 3
compares how security functions are supported at levels 30, 40, and 50. These
functions are explained in more detail in the sections that follow.
| Table 3. Comparison of Security Levels 30, 40, and 50
| Scenario Description
Level 30
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
AF journal entry
AF journal entry
AF journal entry
AF journal entry
14
Level 40
Level 50
AF journal entry 1;
AF journal entry 1;
operation fails.
operation fails.
AF journal entry 1;
AF journal entry 1;
operation fails.
operation fails.
AF journal entry 1; job AF journal entry 1; job
does not run.
does not run.
AF journal entry 1;
sign-on is not
successful.
AF journal entry; 1,2
operation fails. 2
AF journal entry 1;
sign-on is not
successful.
AF journal entry; 1,2
operation fails. 2
Operation fails.
No validation is
performed. Program
must be retranslated
before it can be used.
Program validation is
performed.
AF journal entry;1,2
operation fails.2
AF journal entry;1,2
operation fails.2
AF journal entry;1,2
operation fails.2
Operation fails.
No validation is
performed. Program
must be retranslated
before it can be used.
Program validation is
performed.
AF journal entry;1,2
operation fails.2
AF journal entry;1,2
operation fails.2
AF journal entry;1,2
operation fails.2
Operation fails.
Attempt is successful.
Attempt is successful.
Operation fails.
Attempt is successful.
Parameter validation
is performed.
Parameter validation
is performed.
Attempt is successful.
No validation is
performed. Program
must be retranslated
before it can be used.
Program validation is
performed.
Attempt is successful.
Attempt is successful.
Attempt is successful.
Level 30
Level 40
Level 50
AF journal entry;1,2,4
operation fails.2,4
AF journal entry;1,2,4
operation fails.2,4
|
|
|
|
|
|
Attempt is successful.
An IBM*-supplied command is changed to
run a different program using the CHGCMD
command. The command is changed again
to run the original IBM-supplied program,
which is a system domain program. A user
attempts to run the command.
|
|
An authority failure (AF) type entry is written to the audit (QAUDJRN) journal, if the auditing function is
active. See Chapter 9 for more information about the audit function.
|
|
When you change an IBM-supplied command, it can no longer call a system domain program.
If you use the auditing function at lower security levels, the system logs journal
entries for most of the actions shown in Table 3 on page 14, except those detected
by the enhanced hardware protection function. You receive warnings in the form of
journal entries for potential integrity violations. At level 40 and higher, integrity
violations cause the system to fail the attempted operation.
15
*USER
*SYSTEM
1
*USER
YES
NO
*SYSTEM
YES
YES
A domain or state violation causes the operation to fail at security level 40 and
higher. At all security levels, an AF type entry is written to the audit journal if the
auditing function is active.
Journal Entry:
If the auditing function is active and the QAUDLVL system value includes
*PGMFAIL, an authority failure (AF) entry, violation type D, is written to the
QAUDJRN journal when an attempt is made to use an unsupported interface.
16
and higher, the system controls how *USER state programs access these protected
blocks. This support is not available at security levels less than 40.
Enhanced hardware storage protection is supported on all iSeries models, except
the following:
v All B models
v All C models
v D models: 9402 D04, 9402 D06, 9404 D10, and 9404 D20.
Journal Entry:
If the auditing function is active and the QAUDLVL system value includes
*PGMFAIL, an AF entry, violation type R, is written to the QAUDJRN journal
when a program attempts to write to an area of disk protected by the enhanced
hardware storage protection feature. This support is available only at security level
40 and higher.
Validating Parameters
Interfaces to the operating system are system state programs in user domain. In
other words, they are programs that can be called directly by a user. When
parameters are passed between user state and system state programs, those
parameters must be checked to prevent any unexpected values from jeopardizing
the integrity of the operating system.
When you run your system at security level 40 or 50, the system specifically checks
every parameter passed between a user state program and a system state program
in the user domain. This is required for your system to separate the system and
user domain and to meet the requirements of a C2 level of security. You may
notice some performance impact because of this additional checking.
|
|
|
|
|
|
When a program is created, the iSeries system calculates a validation value, which
is stored with the program. When the program is restored, the validation value is
calculated again and compared to the validation value that is stored with the
program. If the validation values do not match, the actions taken by the system are
controlled by the QFRCCVNRST and QALWOBJRST system values.
|
|
|
|
|
17
|
|
|
|
|
|
|
|
|
|
|
|
The first filter is QVFYOBJRST system value. It controls the restore operation on
some objects that can be digitally signed. After an object is successfully checked
and is validated by this system value, the object proceeds to the second filter,
QFRCCVNRST system value. This system value allows you to specify whether or
not to convert programs, service programs, or module objects during a restore
operation. This system value also prevents certain objects from being restored.
Only when the objects have passed the first two filters do they proceed to the final
filter, QALWOBJRST system value. This system value controls whether or not
objects with security sensitive attributes can be restored.
|
|
|
|
|
|
Programs created for the iSeries can contain information that allows the program
to be re-created at restore time, without requiring the program source. Programs
created for iSeries Version 5, Release 1 and later contain the information needed for
re-creation even when the observability of the program is removed. Programs
created for releases prior to Version 5, Release 1 can only be re-created at restore
time if the observable information of the program has not been deleted.
|
|
Each of these system values are described in the Chapter 3, Security System
Values in the section, entitled Security-Related Restore System Values.
18
program that is restored without a validation value. This can add considerable
time to the restore process. See the topic Validation of Programs Being
Restored on page 17 for more information about program validation.
Note: Restore program libraries as part of your application test. Check the
audit journal for validation failures.
5. Based on the entries in the audit journal, take steps to correct your applications
and prevent program failures.
6. Change the QSECURITY system value to 40 and perform an IPL.
Security Level 50
Security level 50 is designed to meet the requirements defined by the U.S.
Department of Defense for C2 security. It provides enhanced integrity protection in
addition to what is provided by security level 40. Running your system at security
level 50 is required for C2 security. Other requirements for C2 security are
described in the book Security - Enabling for C2.
These security functions are included for security level 50. They are described in
the topics that follow:
v Restricting user domain object types (*USRSPC, *USRIDX, and *USRQ)
v Restricting message handling between user and system state programs
v Preventing modification of all internal control blocks
v Making the QTEMP library a temporary object
19
Note: Objects of type *PGM, *SRVPGM and *SQLPKG can also be in the user
domain. Their contents cannot be manipulated directly, and they are not
affected by the restrictions.
At security level 50, a user must not be permitted to pass security-relevant
information to another user without the ability to send an audit record. To enforce
this:
v At security level 50, no job can get addressability to the QTEMP library for
another job. Therefore, if user domain objects are stored in the QTEMP library,
they cannot be used to pass information to another user.
Because of the difference in handling the QTEMP library at security level 50,
objects in the QTEMP library may not be deleted when you IPL after the system
ends abnormally. You may need to run the Reclaim Storage (RCLSTG) command
more often at security level 50. Objects that are in a users QTEMP library when
the system ends abnormally appear in the QRCL library and need to be deleted
after running the RCLSTG command.
v To provide compatibility with existing applications that use user domain objects,
you can specify additional libraries in the QALWUSRDMN system value. The
QALWUSRDMN system value is enforced at all security levels. See Allow User
Domain Objects (QALWUSRDMN) on page 25 for more information.
System state
User state
User state
User state
v When a user state program receives a message from an external source (*EXT),
any pointers in the message replacement text are removed.
20
At security level 50, no system internal control blocks can be modified. This
includes the open data path (ODP), the spaces for CL commands and programs,
and the S/36 environment job control block.
21
22
This chapter describes the system values that control security on your system.
System values allow you to customize many characteristics of your system. A
group of system values are used to define system-wide security settings.
|
|
|
|
|
|
New for V5R2, you can restrict users from changing several security-related system
values. These restrictions can prevent even a user with *SECADM and *ALLOBJ
authority from changing these system values with the CHGSYSVAL command. In
addition to restricting changes to these system values, you can also restrict adding
digital cerificates to digital certificate store with the Add Verifier API and restrict
password resetting on the digital certificate store.
QALWOBJRST
QLMTDEVSSN
QPWDLVL
QALWUSRDMN QCRTAUT
QLMTSECOFR
QPWDMAXLEN QRMTSRVATR
QAUDCTL
QCRTOBJAUD
QMAXSGNACN QPWDMINLEN
QSECURITY
QAUDENACN
QDEVRCYACN
QMAXSIGN
QPWDPOSDIF
QSHRMEMCTL
QAUDFRCLVL
QDSPSGNINF
QPWDEXPITV
QPWDRQDDGT QUSEADPAUT
QAUDLVL
QDSCJOBITV
QPWDLMTAJC
QPWDRQDDIF
QAUTOCFG
QFRCCVNRST
QPWDLMTCHR QPWDVLDPGM
|
|
QAUTORMT
QINACTMSGQ
QPWDLMTREP
|
|
|
You can use System Service Tools (SST) to enable these restrictions. To work with
these restrictions, you must have a service tools user ID and password. Dedicated
Service Tools also provides the ability to turn on and off these restrictions.
|
|
|
|
|
To
1.
2.
3.
|
|
|
The following sections discuss specific security system values. Those system values
to which you can restrict changes are documented within their corresponding
sections:
v General security system values
v Security-related system values
v Security-related restore system values
v System values that apply to passwords
v System values that control auditing
|
|
|
|
|
|
|
|
QAUTOVRT
QRMTSIGN
QVFYOBJRST
QRETSVRSEC
23
|
|
Purpose:
Specify system values that control security on the system.
|
|
How To:
WRKSYSVAL *SEC (Work with System Values command)
|
|
Authority:
*ALLOBJ and *SECADM
|
|
Journal Entry:
SV
|
|
|
Following are the general system values that control security on your system:
|
|
QALWUSRDMN
Allow user domain objects in the libraries
|
|
QCRTAUT
Create default public authority
|
|
QDSPSGNINF
Display sign-on information
|
|
QFRCCVNRST
Force conversion on restore
|
|
QINACTITV
Inactive job time-out interval
|
|
QINACTMSGQ
Inactive job message queue
|
|
QLMTDEVSSN
Limit device sessions
|
|
QLMTSECOFR
Limit security officer
|
|
QMAXSIGN
Maximum sign-on attempts
|
|
QMAXSGNACN
Action when maximum sign-on attempts exceeded
|
|
QRETSVRSEC
Retain Server Security
|
|
QRMTSIGN
Remote sign-on requests
|
|
QSECURITY
Security level
|
|
QSHRMEMCTL
Shared memory control
|
|
QUSEADPAUT
Use Adopted Authority
|
|
QVFYOBJRST
Verify object on restore
24
|
|
|
|
Descriptions of these system values follow. The possible choices are shown. The
choices that are underlined are the system-supplied defaults. For most system
values, a recommended choice is listed.
|
|
|
|
|
|
The QALWUSRDMN system value specifies which libraries are allowed to contain
user domain objects of type *USRSPC, *USRIDX, and *USRQ. The restriction does
not apply to user domain objects of type *PGM, *SRVPGM, and *SQLPKG. Systems
with high security requirements require the restriction of user *USRSPC, *USRIDX,
*USRQ objects. The system cannot audit the movement of information to and from
user domain objects.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Recommended Value: For most systems, the recommended value is *ALL. If your
system has a high security requirement, you should allow user domain objects
only in the QTEMP library. At security level 50, the QTEMP library is a temporary
object and cannot be used to pass confidential data between users.
|
|
|
|
|
|
|
Some systems have application software that relies on object types *USRSPC,
*USRIDX, or *USRQ. For those systems, the list of libraries for the
QALWUSRDMN system value should include the libraries that are used by the
application software. The public authority of any library placed in
QALWUSRDMN, except QTEMP, should be set to *EXCLUDE. This limits the
number of users that may use MI interface, that cannot be audited, to read or
change the data in user domain objects in these libraries.
|
|
|
|
|
|
|
Note: If you run the Reclaim Storage (RCLSTG) command, user domain objects
may need to be moved in and out of the QRCL (reclaim storage) library. To
run the RCLSTG command successfully, you may need to add the QRCL
library to the QALWUSRDMN system value. To protect system security, set
the public authority to the QRCL library to *EXCLUDE. Remove the QRCL
library from the QALWUSRDMN system value when you have finished
running the RCLSTG command.
|
|
|
25
|
|
|
v The create authority (CRTAUT) for the library of the new object is set to
*SYSVAL.
v The new object is created with public authority (AUT) of *LIBCRTAUT.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
Recommended Value:
*CHANGE
|
|
The QCRTAUT system value is not used for objects created in directories in the
enhanced file system.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
Sign-on Information
Previous sign-on . . . . . . . . . . . . . :
10/30/91
26
System:
14:15:00
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
Note: Display sign-on information can also be specified in individual user profiles.
|
|
|
|
|
|
|
|
|
v
v
v
v
|
|
|
|
|
|
|
Emulation sessions through iSeries Access are included. Local jobs that are signed
on to a remote system are excluded. Jobs that are connected by file transfer
protocol (FTP) are excluded. Prior to Version 4, Release 2, telnet jobs were also
excluded. To control the time-out of FTP connections, change the INACTTIMO
parameter on the Change FTP Attribute (CHGFTPA) command. To control the
time-out of telnet sessions prior to V4R2, use the Change Telnet Attribute
(CHGTELNA) command.
|
|
|
|
|
|
|
Following are examples of how the system determines which jobs are inactive:
v A user uses the system request function to start a second interactive job. A
system interaction, such as the Enter key, on either job causes both jobs to be
marked as active.
v A iSeries Access job may appear inactive to the system if the user is performing
PC functions such as editing a document without interacting with the iSeries
system.
|
|
The QINACTMSGQ system value determines what action the system takes when
an inactive job exceeds the specified interval.
|
|
|
|
|
|
|
When the system is started, it checks for inactive jobs at the interval specified by
the QINACTITV system value. For example, if the system is started at 9:46 in the
morning and the QINACTITV system value is 30 minutes, it checks for inactive
jobs at 10:16, 10:46, 11:16, and so on. If it discovers a job that has been inactive for
30 minutes or more, it takes the action specified by the QINACTMSGQ system
value. In this example, if a job becomes inactive at 10:17, it will not be acted upon
until 11:16. At the 10:46 check, it has been inactive for only 29 minutes.
Using
Using
Using
Using
27
|
|
|
|
|
|
|
|
|
|
|
|
The QINACTMSGQ system value specifies what action the system takes when the
inactive job time-out interval for a job has been reached.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
message-queue-name
|
|
|
|
|
The message queue must exist before it can be specified for the
QINACTMSGQ system value. This message queue is
automatically cleared during an IPL. If you assign
QINACTMSGQ as the users message queue, all messages in
the users message queue are lost during each IPL.
|
|
|
|
|
Recommended Value: *DSCJOB unless your users run iSeries Access jobs. Using
*DSCJOB when some iSeries Access jobs are running is the equivalent of ending
the jobs. It can cause significant loss of information. Use the message-queue option if
28
The Work Management book describes group jobs and secondary jobs.
|
|
you have the iSeries Access licensed program. The CL Programming book shows an
example of writing a program to handle messages.
|
|
|
|
|
Using a Message Queue: A user or a program can monitor the message queue and
take action as needed, such as ending the job or sending a warning message to the
user. Using a message queue allows you to make decisions about particular
devices and user profiles, rather than treating all inactive devices in the same way.
This method is recommended when you use the iSeries Access licensed program.
|
|
|
|
|
If a workstation with two secondary jobs is inactive, two messages are sent to the
message queue (one for each secondary job). A user or program can use the End
Job (ENDJOB) command to end one or both secondary jobs. If an inactive job has
one or more group jobs, a single message is sent to the message queue. Messages
continue to be sent to the message queue for each interval that the job is inactive.
|
|
|
|
|
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
Recommended Value: 1 (Yes) because limiting users to a single device reduces the
likelihood of sharing passwords and leaving devices unattended.
Note: Limiting device sessions can also be specified in individual user profiles.
|
|
|
|
The QLMTSECOFR system value controls whether a user with all-object (*ALLOBJ)
or service (*SERVICE) special authority can sign on to any workstation. Limiting
powerful user profiles to certain well-controlled workstations provides security
protection.
|
|
|
The QLMTSECOFR system value is only enforced at security level 30 and higher.
Workstations on page 187 provides more information about the authority
required to sign on at a workstation.
|
|
You can always sign on at the system console with the QSECOFR, QSRV, and
QSRVBAS profiles, no matter how the QLMTSECOFR value is set.
29
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
If you create the QSYSMSG message queue in the QSYS library, messages about
critical system events are sent to that message queue as well as to QSYSOPR. The
QSYSMSG message queue can be monitored separately by a program or a system
operator. This provides additional protection of your system resources. Critical
system messages in QSYSOPR are sometimes missed because of the volume of
messages sent to that message queue.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
30
|
|
|
|
|
|
|
|
|
|
|
Recommended Value: 3.
|
|
The QMAXSGNACN system value determines what the system does when the
maximum number of sign-on attempts is reached at a workstation.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
The system disables a device by varying it off. The device is disabled only if the
sign-on attempts that are not valid are consecutive on the same device. One valid
sign-on resets the count of incorrect sign-on attempts for the device.
|
|
|
|
|
|
|
|
If you create the QSYSMSG message queue in QSYS, the message sent (CPF1397)
contains the user and device name. Therefore, it is possible to control the disabling
of the device based on the device being used.
|
|
|
|
|
If the QSECOFR profile is disabled, you may sign on as QSECOFR at the console
and enable the profile. If the console is varied off and no other user can vary it on,
you must IPL the system to make the console available.
Recommended Value: 3.
31
|
|
|
|
|
|
|
|
If you change the value from 1 to 0, the system disables access to the
authentication information. If you change the value back to 1, the system reenables
access to the authentication information.
|
|
|
|
|
The authentication information can be removed from the system by setting the
QRETSVRSEC system value to 0 and running the CLRSVRSEC (Clear Server
Security Data) command. If you have a large number of user profiles or validation
lists on your system the CLRSVRSEC command may run for an extensive period of
time.
|
|
|
|
|
|
|
The encrypted data field of a validation list entry is typically used to store
authentication information. Applications specify whether to store the encrypted
data in a decryptable or non-decryptable form. If the applications choose a
decryptable form and the QRETSVRSEC value is changed from 1 to 0, the
encrypted data field information is not accessible from the entry. If the encrypted
data field of a validation list entry is stored in a non-decryptable from, it is not
affected by the QRETSVRSEC system value.
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
Recommended Value: 0.
|
|
|
|
|
The QRMTSIGN system value specifies how the system handles remote sign-on
requests. Examples of remote sign-on are display station pass-through from
another system, the workstation function of the iSeries Access licensed program,
and TELNET access.
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
32
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*VERIFY
|
|
|
|
|
|
|
|
|
*REJECT
program-name library-name
|
|
|
|
|
|
The Remote Work Station Support book contains detailed information about the
QRMTSIGN system value. It also contains the requirements for a remote sign-on
program and an example.
|
|
|
|
The QSHRMEMCTL system value defines which users are allowed to use shared
memory or mapped memory that has write capability. To change this system value,
users must have *ALLOBJ and *SECADM special authorities. A change to this
system value takes effect immediately.
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
33
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Recommended Value: 1.
|
|
|
|
|
|
The QUSEADPAUT system value defines which users can create programs with
the use adopted authority (*USEADPAUT(*YES)) attribute. All users authorized by
the QUSEADPAUT system value can create or change programs and service
programs to use adopted authority if the user has the necessary authority to the
program or service program.
|
|
|
|
|
The system value can contain the name of an authorization list. The users
authority is checked against this list. If the user has at least *USE authority to the
named authorization list, the user can create, change, or update programs or
service programs with the USEADPAUT(*YES) attribute. The authority to the
authorization list cannot come from adopted authority.
|
|
|
If an authorization list is named in the system value and the authorization list is
missing, the function being attempted will not complete. A message is sent
indicating this.
|
|
|
However, if the program is created with the QPRCRTPG API, and the
*NOADPAUT value is specified in the option template, the program creates
successfully even if the authorization list does not exist.
|
|
|
|
|
If more than one function is requested on the command or API, and the
authorization list is missing, the function is not performed. If the command being
attempted when the authorization list cannot be found is Create Pascal Program
(CRTPASPGM) or Create Basic Program (CRTBASPGM), the result is a function
check.
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
34
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
You should carefully consider the security design of your application before
creating the authorization list for QUSEADPAUT system value. This is especially
important for application development environments.
|
|
|
*NONE
|
|
Purpose:
Specify system values that relate to security on the system.
|
|
How To:
WRKSYSVAL (Work with System Values command)
|
|
Authority:
*ALLOBJ and *SECADM
|
|
Journal Entry:
SV
|
|
|
|
|
QAUTOCFG
Automatic device configuration
|
|
QAUTOVRT
Automatic configuration of virtual devices
|
|
QDEVRCYACN
Device recovery action
35
|
|
QDSCJOBITV 1
Disconnected job time-out interval
|
|
QRMTSRVATR
Remote service attribute
|
|
Descriptions of these system values follow. For each value, the possible choices are
shown. The choices that are underlined are the system-supplied defaults.
|
|
|
|
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Recommended Value: When initiating system setup or when adding many new
devices, the system value should be set to 1. At all other times the system value
should be set at 0.
|
|
|
|
The QAUTOVRT system value specifies whether pass-through virtual devices and
TELNET full screen virtual devices (as opposed to the workstation function virtual
device) are automatically configured.
|
|
|
A virtual device is a device description that does not have hardware associated
with it. It is used to form a connection between a user and a physical workstation
attached to a remote system.
|
|
|
|
|
|
|
|
Allowing the system to automatically configure virtual devices makes it easier for
users to break into your system using pass-through or telnet. Without automatic
configuration, a user attempting to break in has a limited number of attempts at
each virtual device. The limit is defined by the security officer using the
QMAXSIGN system value. With automatic configuration active, the actual limit is
higher. The system sign-on limit is multiplied by the number of virtual devices that
can be created by the automatic configuration support. This support is defined by
the QAUTOVRT system value.
1. This system value is also discussed in the Information Center (see Prerequisite and related information on page xvi for details).
36
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
Recommended Value: 0
|
|
|
The Remote Work Station Support book has more information about using display
station pass-through. The TCP/IP Configuration and Reference book as more
information about using TELNET.
|
|
QDEVRCYACN specifies what action to take when an I/O error occurs for an
interactive jobs workstation.
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
When a value of *MSG or *DSCMSG is specified, the device recovery action is not
performed until the next I/O operation is performed by the job. In a LAN/WAN
environment, this may allow one device to disconnect and another to connect,
Chapter 3. Security System Values
37
|
|
|
|
|
using the same address, before the next I/O operation for the job occurs. The job
may recover from the I/O error message and continue running to the second
device. To avoid this, a device recovery action of *DSCENDRQS, *ENDJOB, or
*ENDJOBNOLIST should be specified. These device recovery actions are performed
immediately when an I/O error, such as a power-off operation, occurs.
|
|
Recommended Value:
*DSCMSG
|
|
Note: *ALLOBJ and *SECADM special authorities are not required to change this
value.
|
|
Before Version 3, Release 6, the default value was *MSG. To leave as *MSG
presents a potential security exposure.
|
|
|
The QDSCJOBITV system value determines if and when the system ends a
disconnected job. The interval is specified in minutes.
|
|
|
|
If you set the QINACTMSGQ system value to disconnect inactive jobs (*DSCJOB),
you should set the QDSCJOBITV to end the disconnected jobs eventually. A
disconnected job uses up system resources, as well as retaining any locks on
objects.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
QRMTSRVATR controls the remote system service problem analysis ability. The
value allows the system to be analyzed remotely. New for V5R2, you can also
restrict users with *SECADM and *ALLOBJ authorities from changing this security
related system value with the CHGSYSVAL command. You can specify this
restriction in the System Service Tools (SST) with the Work with system security
option.
|
|
|
38
|
|
|
|
Recommended Value: 0
|
|
For information about remote access and the QRMTSRVATR system value, see
Keylock Security on page 2.
|
|
|
|
|
|
Purpose:
Controls how and which security-related objects are restored on
the system.
|
|
How To:
WRKSYSVAL*SEC (Work with System Values command)
|
|
Authority:
*ALLOBJ and *SECADM
|
|
Journal Entry:
SV
|
|
|
|
QVFYOBJRST
Verify object on restore
|
|
QFRCCVNRST
Force conversion on restore
|
|
QALWOBJRST
Allow restoring of security sensitive objects
|
|
Descriptions of these system values follow. For each value, the possible choices are
shown. The choices that are underlined are the system-supplied defaults.
|
|
|
|
|
|
The QVFYOBJRST system value determines whether objects are required to have
digital signatures in order to be restored to your system. You can prevent anyone
from restoring an object, unless that object has a proper digital signature from a
trusted software provider. This value applies to objects of types: *PGM, *SRVPGM,
*SQLPKG, *CMD and *MODULE. It also applies to *STMF objects which contain
Java programs.
|
|
|
|
|
When an attempt is made to restore an object onto the system, three system values
work together as filters to determine if the object is allowed to be restored. The
first filter is the verify object on restore QVFYOBJRST system value. It is used to
control the restore of some objects that can be digitally signed. The second filter is
the force conversion on restore QFRCCVNRST system value. This system value
Chapter 3. Security System Values
39
|
|
|
|
|
|
allows you to specify whether or not to convert programs, service programs, SQL
packages, and module objects during the restore. It can also prevent some objects
from being restored. Only objects that can get past the first two filters are
processed by the third filter. The third filter is the allow object on restore
(QALWOBJRST) system value. It specifies whether or not objects with
security-sensitive attributes can be restored.
|
|
|
|
If Digital Certificate Manager (OS/400 option 34) is not installed on the system, all
objects except those signed by a system trusted source are treated as unsigned
when determining the effects of the QVFYOBJRST system value during a restore
operation.
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
Attention
|
|
|
When your system is shipped, the QVFYOBJRST system value is set to 3. If you
change the value of QVFYOBJRST, it is important to set the QVFYOBJRST value to
3 or lower before installing a new release of the OS/400 operating system.
|
|
|
|
|
|
This value should not be used unless you have signed objects
to restore which will fail their signature verification for some
acceptable reason.
|
|
|
|
|
|
|
|
40
|
|
|
|
Table 24. Possible Values for the QVFYOBJRST System Value: (continued)
3
Verify signatures on restore. Restore unsigned commands and
user-state objects. Restore signed commands and user-state
objects only if the signatures are valid.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Objects which have the system-state attribute and objects which have the
inherit-state attribute are required to have valid signatures from a system trusted
source. The only value which will allow a system-state or inherit-state object to
restore without a valid signature is 1. Allowing such a command or program
represents an integrity risk to your system. If you change the QVFYOBJRST system
value to 1 to allow such an object to restore on your system, be sure to change the
QVFYOBJRST system value back to its previous value after the object has been
restored.
|
|
|
|
|
|
|
Some commands use a signature that does not cover all parts of the object. Some
parts of the command are not signed while other parts are only signed when they
contain a non-default value. This type of signature allows some changes to be
made to the command without invalidating its signature. Examples of changes that
will not invalidate these types of signatures include:
v Changing command defaults.
v Adding a validity checking program to a command that does not have one.
|
|
|
|
If you wish, you can add your own signature to these commands that includes
these areas of the command object.
Recommended Value: 3.
41
|
|
|
|
|
|
|
This system value allows you to specify whether or not to convert the following
object types during a restore:
v program (*PGM)
v service program (*SRVPGM)
v SQL Package (*SQLPKG)
v module (*MODULE)
|
|
|
It can also prevent some objects from being restored. An object which is specified
to be converted by the system value, but cannot be converted because it does not
contain sufficient creation data, will not be restored.
|
|
|
|
|
|
|
|
The *SYSVAL value for the FRCOBJCVN parameter on the restore commands (RST,
RSTLIB, RSTOBJ, RSTLICPGM) uses the value of this system value. Therefore, you
can turn on and turn off conversion for the entire system by changing the
QFRCCVNRST value. However, the FRCOBJCVN parameter overrides the system
value in some cases. Specifying *YES and *ALL on the FRCOBJCVN will override
all settings of the system value. Specifying *YES and *RQD on the FRCOBJCVN
parameter is the same as specifying 2 for this system value and can override the
system value when it is set to 0 or 1.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the with
theWork with system security option.
|
|
|
42
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
When an attempt is made to restore an object onto the system, three system values
work together as filters to determine if the object is allowed to be restored, or if it
is converted during the restore. The first filter is the verify object on restore
QVFYOBJRST system value. It is used to control the restore of some objects that
can be digitally signed. The second filter is the force conversion on restore
QFRCCVNRST system value. This system value allows you to specify whether or
not to convert programs, service programs, SQL packages, and module objects
during the restore. It can also prevent some objects from being restored. Only
objects that can get past the first two filters are processed by the third filter. The
third filter is the allow object on restore (QALWOBJRST) system value. It specifies
whether or not objects with security-sensitive attributes can be restored.
|
|
When your system is shipped, the QALWOBJRST system value is set to *ALL. This
value is necessary to install your system successfully.
Chapter 3. Security System Values
43
|
|
|
|
|
|
|
|
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
You may specify multiple values for the QALWOBJRST system value, unless you
specify *ALL or *NONE.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
44
|
|
|
Purpose:
Specify system values to set requirements for the passwords
users assign.
|
|
How To:
WRKSYSVAL *SEC (Work with System Values command)
|
|
Authority:
*ALLOBJ and *SECADM
|
|
Journal Entry:
SV
|
|
|
|
Following are the system values that control passwords. These system values
require users to change passwords regularly and help prevent users from assigning
trivial, easily guessed passwords. They can also make sure passwords meet the
requirements of your communications network:
|
|
QPWDEXPITV 2
Expiration interval
|
|
QPWDLVL
Password level
|
|
QPWDMINLEN 2
Minimum length
|
|
QPWDMAXLEN 2
Maximum length
|
|
QPWDRQDDIF 2
Required difference
|
|
QPWDLMTCHR
Restricted characters
|
|
QPWDLMTAJC
Restrict adjacent characters
|
|
QPWDLMTREP
Restrict repeating characters
|
|
QPWDPOSDIF
Character position difference
|
|
QPWDRQDDGT
Require numeric character
|
|
QPWDVLDPGM
Password validation program
|
|
|
|
|
The password-composition system values are enforced only when the password is
changed using the CHGPWD command, the ASSIST menu option to change a
password, or the QSYCHGPW application programming interface (API). They are
not enforced when the password is set using the CRTUSRPRF or CHGUSRPRF
command.
2. These system values are also discussed in the Information Center (seePrerequisite and related information on page xvi for
details).
Chapter 3. Security System Values
45
|
|
|
|
|
|
|
|
|
|
If a password is forgotten, the security officer can use the Change User Profile
(CHGUSRPRF) command to set the password equal to the profile name or to any
other value. The Set password to expired field in the user profile can be used to
require that a password be changed the next time the user signs on.
The QPWDEXPITV system value controls the number of days allowed before a
password must be changed. If a user attempts to sign on after the password has
expired, the system shows a display requiring that the password be changed before
the user is allowed to sign on.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
Sign-on Information
System:
Password must be changed to continue sign-on
Previous sign-on . . . . . . . . . . . . . :
10/30/91
14:15:00
|
|
|
The password level of the system can be set to allow for user profile passwords
from 1-10 characters or to allow for user profile passwords from 1-128 characters.
|
|
|
|
The password level can be set to allow a passphrase as the password value. The
term passphrase is sometimes used in the computer industry to describe a
password value which can be very long and has few, if any, restrictions on the
characters used in the password value. Blanks can be used between letters in a
46
|
|
|
|
|
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
47
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Table 28. Possible Values for the QPWDLVL System Value: (continued).
2
The system supports user profile passwords from 1-128
characters. Upper and lower case characters are allowed.
Passwords can consist of any character and the password will
be case sensitive. QPWDLVL 2 is viewed as a compatibility
level. This level allows for a move back to QPWDLVL 0 or 1 as
long as the password created on QPWDLVL 2 or 3 meets the
length and syntax requirements of a password valid on
QPWDLVL 0 or 1. QPWDLVL 2 can be used if your system
communicates with the Windows 95/98/ME iSeries Client
Support for Windows Network Neighborhood (NetServer)
product as long as your password is 1-14 characters in length.
QPWDLVL 2 cannot be used if your system communicates with
other iSeries systems in a network and those systems are
running with either a QPWDLVL value of 0 or 1 or an
operating system release less than V5R1M0. QPWDLVL 2
cannot be used if your system communicates with any other
system that limits the length of passwords from 1-10 characters.
No encrypted passwords are removed from the system when
QPWDLVL is changed to 2.
3
The system supports user profile passwords from 1-128
characters. Upper and lower case characters are allowed.
Passwords can consist of any character and the password will
be case sensitive. QPWDLVL 3 cannot be used if your system
communicates with other iSeries systems in a network and
those systems are running with either a QPWDLVL value of 0
or 1 or an operating system release less than V5R1M0.
QPWDLVL 3 cannot be used if your system communicates with
any other system that limits the length of passwords from 1-10
characters. QPWDLVL 3 cannot be used if your system
communicates with the Windows 95/98/ME iSeries Client
Support for Windows Network Neighborhood (NetServer)
product. All user profile passwords that are used at QPWDLVL
0 and 1 are removed from the system when QPWDLVL is 3.
Changing from QPWDLVL 3 back to QPWDLVL 0 or 1 requires
a change to QPWDLVL 2 before going to 0 or 1. QPWDLVL 2
allows for the creation of user profile passwords that can be
used at QPWDLVL 0 or 1 as long as the length and syntax
requirements for the password meet the QPWDLVL 0 or 1
rules.
|
|
|
|
Changing the password level of the system from 1-10 character passwords to 1-128
character passwords requires careful consideration. If your system communicates
with other systems in a network, then all systems must be able to handle the
longer passwords.
|
|
|
A change to this system value takes effect at the next IPL. To see the current and
pending password level values, use the CL command DSPSECA (Display Security
Attributes).
|
|
|
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
48
|
|
|
|
|
|
|
|
|
|
|
Recommended Value: 6, to prevent users from assigning passwords that are easily
guessed, such as initials or a single character.
|
|
|
|
|
|
|
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
Recommended Value: 8.
|
|
|
|
|
The QPWDRQDDIF system value controls whether the password must be different
from previous passwords. This value provides additional security by preventing
users from specifying passwords used previously. It also prevents a user whose
password has expired from changing it and then immediately changing it back to
the old password.
|
|
Note: The value of the QPWDRQDDIF system value determines how many of
these previous passwords are checked for a duplicate password.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
Chapter 3. Security System Values
49
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The QPWDLMTCHR system value is not enforced when the password level
(QPWDLVL) system value has a value of 2 or 3. The QPWDLMTCHR system value
can be changed at QPWDLVL 2 or 3, but will not be enforced until QPWDLVL is
changed to a value of 0 or 1.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
50
|
|
|
|
|
|
The QPWDLMTAJC system value limits the use of numeric characters next to each
other (adjacent) in a password. This value provides additional security by
preventing users from using birthdays, telephone numbers, or a sequence of
numbers as passwords.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
When the password level (QPWDLVL) system value has a value of 2 or 3, the test
for repeated characters is case sensitive. This means that a lowercase a is not the
same as an uppercase A.
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
Table 35 on page 52 shows examples of what passwords are allowed based on the
QPWDLMTREP system value.
51
|
|
Password Example
QPWDLMTREP
Value of 0
QPWDLMTREP
Value of 1
QPWDLMTREP
Value of 2
|
|
|
|
|
A11111
BOBBY
AIRPLANE
N707UK
Allowed
Allowed
Allowed
Allowed
Not
Not
Not
Not
Not allowed
Not allowed
Allowed
Allowed
|
|
Password Example
QPWDLMTREP
Value of 0
QPWDLMTREP
Value of 1
QPWDLMTREP
Value of 2
j222222
ReallyFast
MomsApPlePie
AaBbCcDdEe
Allowed
Allowed
Allowed
Allowed
Not allowed
Not allowed
Not allowed
Allowed
Not allowed
Not allowed
Allowed
Allowed
|
|
|
|
|
allowed
allowed
allowed
allowed
|
|
|
|
The QPWDPOSDIF system value controls each position in a new password. This
provides additional security by preventing users from using the same character
(alphabetic or numeric) in a position corresponding to the same position in the
previous password.
|
|
|
When the password level (QPWDLVL) system value has a value of 2 or 3, the test
for the same character is case sensitive. This means that a lowercase a is not the
same as an uppercase A.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
52
|
|
|
|
|
|
|
Recommended Value: 1.
|
|
|
|
|
|
|
The topic Using a Password Approval Program discusses the requirements of the
password approval program and shows an example.
|
|
A password approval program must reside in the system auxiliary storage pool
(ASP) or a basic user ASP.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
53
|
|
|
In case it is necessary to recover your system from a disk failure, place the
password approval program in library QSYS. This way the password approval
program is loaded when you restore library QSYS.
|
|
Position
|
|
|
|
|
|
Type
Length
*CHAR
10
2
3
*CHAR
*CHAR
10
1
*CHAR
10
Description
The new password entered by the
user.
The users old password.
Return code: 0 for valid password;
not 0 for incorrect password.
The name of the user.
|
|
|
|
|
|
|
|
|
|
If your program determines that the new password is not valid, you can either
send your own exception message (using the SNDPGMMSG command ) or set the
return code to a value other than 0 and let the system display an error message.
Exception messages that are signaled by your program must be created with the
DMPLST(*NONE) option of the Add Message Description (ADDMSGD) command.
|
|
|
|
The new password is accepted only if the user-written program ends with no
escape message and a return code of 0. Because the return code is initially set for
passwords that are not valid (not zero), the approval program must set the return
code to 0 for the password to be changed.
|
|
|
|
|
Attention: The current and new password are passed to the validation program
without encryption. The validation program could store passwords in a database
file and compromise security on the system. Make sure the functions of the
validation program are reviewed by the security officer and that changes to the
program are strictly controlled.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Position 4 is optional.
/**************************************************/
/* NAME:
PWDVALID - Password Validation
*/
/*
*/
/* FUNCTION: Limit password change to one per
*/
/*
day unless the password is expired
*/
/**************************************************/
PGM (&NEW &OLD &RTNCD &USER)
DCL VAR(&NEW)
TYPE(*CHAR) LEN(10)
DCL VAR(&OLD)
TYPE(*CHAR) LEN(10)
DCL VAR(&RTNCD)
TYPE(*CHAR) LEN(1)
DCL VAR(&USER)
TYPE(*CHAR) LEN(10)
DCL VAR(&JOBDATE)
TYPE(*CHAR) LEN(6)
DCL VAR(&PWDCHGDAT) TYPE(*CHAR) LEN(6)
54
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
DCL VAR(&PWDEXP)
TYPE(*CHAR) LEN(4)
/* Get the current date and convert to YMD format */
RTVJOBA
DATE(&JOBDATE)
CVTDAT
DATE(&JOBDATE) TOVAR(&JOBDATE) +
TOFMT(*YMD)
TOSEP(*NONE)
/* Get date password last changed and whether
*/
/* password is expired from user profile
*/
RTVUSRPRF USRPRF(&USER) PWDCHGDAT(&PWDCHGDAT)+
PWDEXP(&PWDEXP)
/* Compare two dates
*/
/*
if equal and password not expired
*/
/*
then send *ESCAPE message to prevent change */
/*
else set return code to allow change
*/
IF (&JOBDATE=&PWDCHGDAT *AND &PWDEXP=*NO ) +
SNDPGMMSG MSGID(CPF9898) MSGF(QCPFMSG) +
MSGDTA(Password can be changed only +
once per day) +
MSGTYPE(*ESCAPE)
ELSE CHGVAR &RTNCD 0
ENDPGM
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
This example checks to make sure the new password is in CCSID 37 (or if it is in
CCSID 13488 it converts the new password to CCSID 37), that the new password
does not end in a numeric character, and that the new password does not contain
the user profile name. The example assumes that a message file (PWDERRORS)
has been created and message descriptions (PWD0001 and PWD0002) have been
added to the message file. Additional calculations can be added to the program to
check other criteria for passwords:
/**********************************************************/
/*
*/
/* NAME:
PWDEXITPGM1 - Password validation exit 1
*/
/*
*/
/* Validates passwords when *REGFAC is specified for
*/
/* QPWDVLDPGM. Program is registered using the ADDEXITPGM*/
/* CL command for the QIBM_QSY_VLD_PASSWRD exit point.
*/
/*
*/
/*
*/
/* ASSUMPTIONS: If CHGPWD command was used, password
*/
/* CCSID will be job default (assumed to be CCSID 37).
*/
/* If QSYCHGPW API was used, password CCSID will be
*/
/* UNICODE CCSID 13488.
*/
/**********************************************************/
DCL &EXINPUT
DCL &RTN
*CHAR 1000
*CHAR 1
DCL
DCL
DCL
DCL
DCL
DCL
DCL
DCL
*CHAR 10
*CHAR 256
*DEC 5 0
*DEC 5 0
*DEC 5 0
*DEC 5 0
*DEC 5 0
*DEC 5 0
&UNAME
&NEWPW
&NPOFF
&NPLEN
&INDX
&INDX
&INDX
&INDX
DCL &XLTCHR2
DCL &XLTCHR
DCL &XLATEU
*CHAR 2 VALUE(X0000)
*DEC 5 0
*CHAR 255 VALUE(............................... +
!"#$%&()*+,-./0123456789:;<=>?+
@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_+
`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~.+
................................+
Chapter 3. Security System Values
55
................................+
................................+
...............................)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
DCL &XLATEC
/*********************************************************************/
/* FORMAT OF EXINPUT IS:
*/
/* POSITION
DESCRIPTION
*/
/* 001 - 020 EXIT POINT NAME
*/
/* 021 - 028 EXIT POINT FORMAT NAME
*/
/* 029 - 032 PASSWORD LEVEL (binary)
*/
/* 033 - 042 USER PROFILE NAME
*/
/* 043 - 044 RESERVED
*/
/* 045 - 048 OFFSET TO OLD PASSWORD (binary)
*/
/* 049 - 052 LENGTH OF OLD PASSWORD (binary)
*/
/* 053 - 056 CCSID OF OLD PASSWORD (binary)
*/
/* 057 - 060 OFFSET TO NEW PASSWORD (binary)
*/
/* 061 - 064 LENGTH OF NEW PASSWORD (binary)
*/
/* 065 - 068 CCSID OF NEW PASSWORD (binary)
*/
/* ??? - ??? OLD PASSWORD
*/
/* ??? - ??? NEW PASSWORD
*/
/*
*/
/*********************************************************************/
/*********************************************************************/
/* Establish a generic monitor for the program.
*/
/*********************************************************************/
MONMSG
CPF0000
/* Assume new password is valid */
CHGVAR &RTN VALUE(0) /* accept */
/* Get new password length, offset and value. Also get user name */
CHGVAR &NPLEN VALUE(%BIN(&EXINPUT 61 4))
CHGVAR &NPOFF VALUE(%BIN(&EXINPUT 57 4) + 1)
CHGVAR &UNAME VALUE(%SST(&EXINPUT 33 10))
CHGVAR &NEWPW VALUE(%SST(&EXINPUT &NPOFF &NPLEN))
/* If CCSID is 13488, probably used the QSYCHGPW API which converts */
/* the passwords to UNICODE CCSID 13488. So convert to CCSID 37, if */
/* possible, else give an error */
IF COND(%BIN(&EXINPUT 65 4) = 13488) THEN(DO)
CHGVAR &INDX2 VALUE(1)
CHGVAR &INDX3 VALUE(1)
CVT1:
CHGVAR &XLTCHR VALUE(%BIN(&NEWPW &INDX2 2))
IF COND( (&XLTCHR *LT 1) *OR (&XLTCHR *GT 255) ) THEN(DO)
CHGVAR &RTN VALUE(3) /* reject */
SNDPGMMSG MSG(INVALID CHARACTER IN NEW PASSWORD)
GOTO DONE
ENDDO
CHGVAR %SST(&NEWPW &INDX3 1) VALUE(%SST(&XLATEU &XLTCHR 1))
CHGVAR &INDX2 VALUE(&INDX2 + 2)
CHGVAR &INDX3 VALUE(&INDX3 + 1)
IF COND(&INDX2 > &NPLEN) THEN(GOTO ECVT1)
GOTO CVT1
ECVT1:
CHGVAR &NPLEN VALUE(&INDX3 - 1)
CHGVAR %SST(&EXINPUT 65 4) VALUE(X00000025)
56
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
ENDDO
/* Check the CCSID of the new password value - must be 37
IF COND(%BIN(&EXINPUT 65 4) *NE 37) THEN(DO)
CHGVAR &RTN VALUE(3) /* reject */
SNDPGMMSG MSG(CCSID OF NEW PASSWORD MUST BE 37)
GOTO DONE
ENDDO
*/
*/
*/
57
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Overview:
|
|
|
Purpose:
Specify system values to control security auditing on the
system.
|
|
How To:
WRKSYSVAL *SEC (Work with System Values command)
|
|
Authority:
*AUDIT
|
|
Journal Entry:
SV
|
|
QAUDCTL
Auditing control
|
|
QAUDENDACN
Auditing end action
|
|
QAUDFRCLVL
Auditing force level
|
|
QAUDLVL
Auditing level
|
|
QCRTOBJAUD
Create default auditing
|
|
|
Descriptions of these system values follow. The possible choices are shown. The
choices that are underlined are the system-supplied defaults. For most system
values, a recommended choice is listed.
|
|
|
|
|
58
|
|
v The auditing defined for users using the Change User Audit (CHGUSRAUD)
command
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
You can specify more than one value for the QAUDCTL system value, unless you
specify *NONE.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The QAUDENDACN system value determines what action the system takes if
auditing is active and the system is unable to write entries to the audit journal.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
59
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*PWRDWNSYS
|
|
|
|
|
|
|
Only very unusual circumstances cause the system to be unable to write audit
journal entries. However, if this does happen and the QAUDENDACN system
value is *PWRDWNSYS, your system ends abnormally. This could cause a lengthy
initial program load (IPL) when your system is powered on again.
|
|
|
|
The QAUDFRCLVL system value determines how often new audit journal entries
are forced from memory to auxiliary storage. This system value controls the
amount of auditing data that may be lost if the system ends abnormally.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
60
|
|
|
The QAUDLVL system value determines which security-related events are logged
to the security audit journal (QAUDJRN) for all system users. You can specify
more than one value for the QAUDLVL system value, unless you specify *NONE.
|
|
For the QAUDLVL system value to take effect, the QAUDCTL system value must
include *AUDLVL.
|
|
|
|
New for V5R2, you can restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
See Planning the Auditing of Actions on page 253 for a complete description of
the journal entry types and the possible values for QAUDLVL.
|
|
|
|
The QCRTOBJAUD system value is used to determine the auditing value for a new
object, if the auditing default for the library of the new object is set to *SYSVAL.
The QCRTOBJAUD system value is also the default object auditing value for new
folderless documents.
|
|
|
|
For example, the CRTOBJAUD value for the CUSTLIB library is *SYSVAL. The
QCRTOBJAUD value is *CHANGE. If you create a new object in the CUSTLIB
library, its object auditing value is automatically set to *CHANGE. You can change
the object auditing value using the CHGOBJAUD command.
61
|
|
|
|
New for V5R2, you can also restrict users with *SECADM and *ALLOBJ authorities
from changing this security related system value with the CHGSYSVAL command.
You can specify this restriction in the System Service Tools (SST) with the Work
with system security option.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Recommended Value: The value you select depends upon the auditing
requirements of your installation. The section Planning the Auditing of Object
Access on page 263 provides more information about methods for setting up
object auditing on your system. You may also control the auditing value at the
library level with the CRTOBJAUD parameter with the CRTLIB command and the
CHGLIB command.
62
Group Profiles
A group profile is a special type of user profile. It serves two purposes on the
system:
63
Security tool
A group profile provides a method for organizing authorities on your
system and sharing them among users. You can define object authorities or
special authorities for group profiles rather than for each individual user
profile. A user may be a member of up to 16 group profiles.
Customizing tool
A group profile can be used as a pattern for creating individual user
profiles. Most people who are part of the same group have the same
customizing needs, such as the initial menu and the default printer. You
can define these things in the group profile and then copy the group
profile to create individual user profiles.
You create group profiles in the same way that you create individual profiles. The
system recognizes a group profile when you add the first member to it. At that
point, the system sets information in the profile indicating that it is a group profile.
The system also generates a group identification number (gid) for the profile. You
can also designate a profile as a group profile at the time that you create it by
specifying a value in the GID parameter. Planning Group Profiles on page 229
shows an example of setting up a group profile.
64
user-profile displays that use basic assistance level. The basic assistance
level displays show a subset of the fields in the user profile. Not shown
means the field does not appear on the basic assistance level display. When
you use the Add User display to create a user profile, default values are
used for all fields that are not shown.
CL parameter:
You use the CL parameter name for a field in a CL program or when you
enter a user profile command without prompting.
Length:
If you use the Retrieve User Profile (RTVUSRPRF) command in a CL
program, this is the length you should use to define the parameter
associated with the field.
Authority:
If a field refers to a separate object, such as a library or a program, you are
told the authority requirements for the object. To specify the object when
you create or change a user profile, you need the authority listed. To sign
on using the profile, the user needs the authority listed. For example, if
you create user profile USERA with job description JOBD1, you must have
*USE authority to JOBD1. USERA must have *USE authority to JOBD1 to
successfully sign on with the profile.
In addition, each section describes the possible values for the field and a
recommended value.
65
Anderson, George
Anderson, Roger
Harrisburg, Keith
Jones, Sharon
Jones, Keith
ANDERSOG
ANDERSOR
HARRISBK
JONESS
JONESK
Password
Add User prompt:
Password
CL parameter:
PASSWORD
Length:
128
The password is used to verify a users authority to sign on the system. A user ID
and a password must be specified to sign on when password security is active
(QSECURITY system value is 20 or higher).
Passwords can be a maximum of 10 characters when the QPWDLVL system value
is set to 0 or 1. Passwords can be a maximum of 128 characters when the
QPWDLVL system value is set to 2 or 3.
When the password level (QPWDLVL) system value is 0 or 1, the rules for
specifying passwords are the same as those used for user profile names. When the
first character of the password is a Q and the second character is a numeric
character, the Q can be omitted on the Sign On display. If a user specifies Q12345
as the password on the Change Password display, the user can specify either 12345
or Q12345 as the password on the Sign On display. When QPWDLVL is 2 or 3, the
66
user must specify the password as Q12345 on the signon display if the user profile
was created with a password of Q12345. An all numeric password is allowed when
QPWDLVL is 2 or 3, but the user profile password must be created as all numeric.
When the password level (QPWDLVL) system value is 2 or 3, the password is case
sensitive and can contain any character including blank characters. However, the
password may not begin with an asterisk character (*) and trailing blank
characters are removed.
|
|
|
|
|
67
to *ENABLED when the user is ready to sign on. This protects a new user
profile from being used by someone who is not authorized.
v Use the password composition system values to prevent users from assigning
trivial passwords.
v Some communications methods send passwords between systems and limit the
length of password and the characters that passwords can contain. If your
system communicates with other systems, use the QPWDMAXLEN system value
to limit the passwords length. At password levels 0 and 1, the QPWDLMTCHR
system value can be used to specify characters that cannot be used in
passwords.
Sign-on Information
System:
Password must be changed to continue sign-on
Previous sign-on . . . . . . . . . . . . . :
10/30/91
68
14:15:00
Recommendations: Set the password to expired whenever you create a new user
profile or assign a temporary password to a user.
Status
Add User prompt:
Not shown
CL parameter:
STATUS
Length:
10
The value of the Status field indicates if the profile is valid for sign-on. If the
profile status is enabled, the profile is valid for sign-on. If the profile status is
disabled, an authorized user has to enable the profile again to make it valid for
sign-on.
You can use the CHGUSRPRF command to enable a profile that has been disabled.
You must have *SECADM special authority and *OBJMGT and *USE authority to
the profile to change its status. The topic Enabling a User Profile on page 112
shows an example of an adopted authority program to allow a system operator to
enable a profile.
The system may disable a profile after a certain number of incorrect sign-on
attempts with that profile, depending on the settings of the QMAXSIGN and
QMAXSGNACN system values.
You can always sign on with the QSECOFR (security officer) profile at the console,
even if the status of QSECOFR is *DISABLED. If the QSECOFR user profile
becomes disabled, sign on as QSECOFR at the console and type CHGUSRPRF QSECOFR
STATUS(*ENABLED).
Table 48. Possible Values for STATUS:
*ENABLED
The profile is valid for sign-on.
*DISABLED
The profile is not valid for sign-on until an authorized user
enables it again.
User Class
Add User prompt:
Type of User
CL parameter:
USRCLS
Length:
10
User class is used to control what menu options are shown to the user on OS/400
menus. This does not necessarily limit the use of commands. The Limit capabilities
field controls whether the user can enter commands. User class may not affect
what options are shown on menus provided by other licensed programs.
Chapter 4. User Profiles
69
If no special authorities are specified when a user profile is created, the user class
and the security level (QSECURITY) system value are used to determine the
special authorities for the user.
Possible Values for USRCLS: Table 49 shows the possible user classes and what
the default special authorities are for each user class. The entries indicate that the
authority is given at security levels 10 and 20 only, at all security levels, or not at
all.
The default value for user class is *USER.
Table 49. Default Special Authorities by User Class
User Classes
Special
Authority
*SECOFR
*ALLOBJ
*SECADM
*JOBCTL
*SPLCTL
*SAVSYS
*SERVICE
*AUDIT
*IOSYSCFG
All
All
All
All
All
All
All
All
*SECADM
*PGMR
*SYSOPR
10 or 20
All
10 or 20
10 or 20
10 or 20
10 or 20
All
10 or 20
10 or 20
All
*USER
10 or 20
10 or 20
Recommendations: Most users do not need to perform system functions. Set the
user class to *USER, unless a user specifically needs to use system functions.
Assistance Level
Add User prompt:
Not shown
CL parameter:
ASTLVL
Length:
10
For each user, the system keeps track of the last assistance level used for every
system display that has more than one assistance level. That level is used the next
time the user requests that display. During an active job, a user can change the
assistance level for a display or group of related displays by pressing F21 (Select
assistance level). The new assistance level for that display is stored with the user
information.
Specifying the assistance level (ASTLVL) parameter on a command does not
change the assistance level that is stored for the user for the associated display.
The Assistance level field in the user profile is used to specify the default assistance
level for the user when the profile is created. If the assistance level in the user
profile is changed using the CHGUSRPRF or the Change Profile (CHGPRF)
command, the assistance levels stored for all displays for that user are reset to the
new value.
For example, assume the user profile for USERA is created with the default
assistance level (basic). Table 50 on page 71 shows whether USERA sees the Work
70
with User Profiles display or the Work with User Enrollment display when using
different options. The table also shows whether the system changes the version for
the display that is stored with USERAs profile.
Table 50. How Assistance Levels Are Stored and Changed
Action Taken
Changed to intermediate
assistance level
No change (intermediate)
No change (intermediate)
No change (basic)
Type WRKUSRPRF
ASTLVL(*INTERMED)
No change (basic)
Note: The User option field in the user profile also affects how system displays are
shown. This field is described on page 98.
Table 51. Possible Values for ASTLVL:
*SYSVAL
The assistance level specified in the QASTLVL system value is
used.
*BASIC
The Operational Assistant user interface is used.
*INTERMED
The system interface is used.
*ADVANCED
The expert system interface is used. To allow for more list
entries, the option numbers and the function keys are not
always displayed. If a command does not have an advanced
(*ADVANCED) level, the intermediate (*INTERMED) level is
used.
Current Library
Add User prompt:
Default library
CL parameter:
CURLIB
Length:
10
Authority
*USE
The current library is searched before the libraries in the user portion of the library
list for any objects specified as *LIBL. If the user creates objects and specifies
*CURLIB, the objects are put in the current library.
Chapter 4. User Profiles
71
The current library is automatically added to the users library list when the user
signs on. It does not need to be included in the initial library list in the users job
description.
The user cannot change the current library if the Limit capabilities field in the user
profile is *YES or *PARTIAL.
The topic Library Lists on page 193 provides more information about using
library lists and the current library.
Table 52. Possible Values for CURLIB:
*CRTDFT
This user has no current library. If objects are created using
*CURLIB on a create command, the library QGPL is used as
the default current library.
current-library-name
The name of a library.
Recommendations: Use the Current library field to control where users are allowed
to put new objects, such as Query programs. Use the Limit capabilities field to
prevent users from changing the current library.
Initial Program
Add User prompt:
Sign on program
CL parameter:
INLPGM
Length:
10 (program name) 10 (library name)
Authority:
*USE for program *EXECUTE for library
You can specify the name of a program to call when a user signs on. This program
runs before the initial menu, if any, is displayed. If the Limit capabilities field in the
users profile is *YES or *PARTIAL, the user cannot specify an initial program on
the Sign On display.
The initial program is called only if the users routing program is QCMD or QCL.
See Starting an Interactive Job on page 185 for more information about the
processing sequence when a user signs on.
Initial programs are used for two main purposes:
v To restrict a user to a specific set of functions.
v To perform some initial processing, such as opening files or establishing the
library list, when the user first signs on.
Parameters cannot be passed to an initial program. If the initial program fails, the
user is not able to sign on.
Table 53. Possible Values for INLPGM:
*NONE
No program is called when the user signs on. If a menu name
is specified on the initial menu (INLMNU) parameter, that
menu is displayed.
program-name
The name of the program that is called when the user signs on.
72
Initial Menu
Add User prompt:
First menu
CL parameter:
INLMNU
Length:
10 (menu name) 10 (library name)
Authority
*USE for menu *EXECUTE for library
You can specify the name of a menu to be shown when the user signs on. The
initial menu is displayed after the users initial program runs. The initial menu is
called only if the users routing program is QCMD or QCL.
If you want the user to run only the initial program, you can specify *SIGNOFF for
the initial menu.
If the Limit capabilities field in the users profile is *YES, the user cannot specify a
different initial menu on the Sign On display. If a user is allowed to specify an
initial menu on the Sign On display, the menu specified overrides the menu in the
user profile.
Table 55. Possible Values for MENU:
MAIN
The iSeries system Main Menu is shown.
*SIGNOFF
The system signs off the user when the initial program
completes. Use this to limit users to running a single program.
menu-name
The name of the menu that is called when the user signs on.
Table 56. Possible Values for MENU Library:
*LIBL
The library list is used to locate the menu. If the initial
program adds entries to the library list, those entries are
included in the search, because the menu is called after the
initial program has completed.
*CURLIB
The current library for the job is used to locate the menu. If no
current library entry exists in the library list, QGPL is used.
library-name
The library where the menu is located.
Limit Capabilities
Add User prompt:
Restrict command line use
CL parameter:
LMTCPB
Chapter 4. User Profiles
73
Length:
10
You can use the Limit capabilities field to limit the users ability to enter commands
and to override the initial program, initial menu, current library, and
attention-key-handling program specified in the user profile. This field is one tool
for preventing users from experimenting on the system.
A user with LMTCPB(*YES) can only run commands that are defined as allow
limited user (ALWLMTUSR) *YES. These commands are shipped by IBM with
ALWLMTUSR(*YES):
Sign off (SIGNOFF)
Send message (SNDMSG)
Display messages (DSPMSG)
Display job (DSPJOB)
Display job log (DSPJOBLOG)
Start PC Organizer (STRPCO)
Work with Messages (WRKMSG)
The Limit capabilities field in the user profile and the ALWLMTUSR parameter on
commands apply only to commands that are run from the command line, the
Command Entry display or an option from a command grouping menu. Users are
not restricted from doing the following:
v Running commands in CL programs that are running a command as a result of
taking an option from a menu
v Running remote commands through applications.
You can allow the limited capability user to run additional commands, or remove
some of these commands from the list, by changing the ALWLMTUSR parameter
for a command. Use the Change Command (CHGCMD)command. If you create
your own commands, you can specify the ALWLMTUSR parameter on the Create
Command (CRTCMD) command.
Possible Values: Table 57 shows the possible values for Limit capabilities and what
functions are allowed for each value.
Table 57. Functions Allowed for Limit Capabilities Values
Function
*YES
*PARTIAL
*NO
No
No
No
No
A few1
No
Yes
No
No
Yes
Yes
Yes
Yes
Yes
Yes
74
Text
Add User prompt:
User description
CL parameter:
TEXT
Length:
50
The text in the user profile is used to describe the user profile or what it is used
for. For user profiles, the text should have identifying information, such as the
users name and department. For group profiles, the text should identify the
group, such as what departments the group includes.
Table 58. Possible Values for text:
*BLANK:
No text is specified.
description
Specify no more than 50 characters.
Recommendations: The Text field is truncated on many system displays. Put the
most important identifying information at the beginning of the field.
Special Authority
Add User prompt:
Not shown
CL parameter:
SPCAUT
Length:
100 (10 characters per special authority)
Authority:
To give a special authority to a user profile, you must have that special
authority.
Special authority is used to specify the types of actions a user can perform on
system resources. A user can be given one or more special authorities.
Table 59. Possible Values for SPCAUT:
*USRCLS
Special authorities are granted to this user based on the user
class (USRCLS) field in the user profile and the security level
(QSECURITY) system value. If *USRCLS is specified, no
additional special authorities can be specified for this user.
If you specify *USRCLS when you create or change a user
profile, the system puts the correct special authorities in the
profile as if you had entered them. When you display profiles,
you cannot tell whether special authorities were entered
individually or entered by the system based on the user class.
*NONE
special-authority-name
75
76
You can change the job priority (JOBPTY) and the output priority (OUTPTY) of
your own job without job control special authority. You must have *JOBCTL special
authority to change the run priority (RUNPTY) of your own job.
Changes to the output priority and job priority of a job are limited by the priority
limit (PTYLMT) in the profile of the user making the change.
Risks: A user with *JOBCTL special authority can change the priority of jobs and
of printing, end a job before it has finished, or delete output before it has printed.
*JOBCTL special authority can also give a user access to confidential spooled
output, if output queues are specified OPRCTL(*YES). A user who abuses *JOBCTL
special authority can cause negative impacts on individual jobs and on overall
system performance.
77
ENDCMNTRC
PRTCMNTRC
DLTCMNTRC
CHKCMNTRC
TRCCNN
TRCINT
Trace Internal
STRTRC
ENDTRC
PRTTRC
DLTTRC
Select Properties.
Click Capabilities.
Open the Applications tab.
Select Access for.
Select Host Applications.
Select Operating System.
Select Service.
Use the checkbox to grant or revoke access to trace command.
78
Risks: A user with *AUDIT special authority can stop and start auditing on the
system or prevent auditing of particular actions. If having an audit record of
security-relevant events is important for your system, carefully control and monitor
the use of *AUDIT special authority.
Note: Only a user with *ALLOBJ, *SECADM, and *AUDIT special authorities can
give another user *AUDIT special authority.
79
Special Environment
Add User prompt:
Not shown
CL parameter:
SPCENV
Length:
10
Special environment determines the environment the user operates in after signing
on. The user can operate in the iSeries, the System/36, or the System/38
environment. When the user signs on, the system uses the routing program and
the special environment in the users profile to determine the users environment.
See Figure 2 on page 81.
Table 61. Possible Values for SPCENV:
*SYSVAL
The QSPCENV system value is used to determine the
environment when the user signs on, if the users routing
program is QCMD.
*NONE
The user operates in the iSeries environment.
*S36
The user operates in the System/36 environment if the users
routing program is QCMD.
80
|
|
|
|
|
Special environment determines the environment the user operates in after signing
on. The user can operate in the iSeries, the System/36, or the System/38
environment. When the user signs on, the system uses the routing program and
the special environment in the users profile to determine the users environment.
The following description explains Figure 2.
|
|
|
|
|
The system determines if the routing program is QCMD. If it is not, then the
system checks to see if the routing program is QCL. If the routing program is QCL,
then the system will use the System/38 special environment. If the routing
program is not QCL, then the system uses the program specified in the routing
entry.
|
|
|
|
If the routing program is QCMD, then the system determines if the SPCENV
system value is set. If it is set then the system retrieves the value for QSPCENV
system value and the system tests the special environment value. If SPCENV
system value is not set, then the system tests the special environment value.
81
If the special environment value is set to *S36, the system runs the System/36
special environment. If the special environment value is set to *NONE, then the
system runs the native iSeries environment.
|
|
|
10/30/91
System:
14:15:00
82
When a users password has expired, the user receives a message at sign-on. The
user can either press the Enter key to assign a new password or press F3 (Exit) to
cancel the sign-on attempt without assigning a new password. If the user chooses
to change the password, the Change Password display is shown and full password
validation is run for the new password. Figure 1 on page 68 shows an example of
the password expiration message.
Recommendations: Use the user profile password interval to require profiles with
*SERVICE, *SAVSYS, or *ALLOBJ special authorities to change passwords more
frequently than other users.
Table 63. Possible Values for PWDEXPITV:
*SYSVAL
The QPWDEXPITV system value is used.
*NOMAX
The system does not require the user to change the password.
password- expiration- interval Specify a number from 1 through 366.
Keyboard Buffering
Add User prompt:
Not shown
CL parameter:
KBDBUF
Length:
10
83
This parameter specifies the keyboard buffering value used when a job is
initialized for this user profile. The new value takes effect the next time the user
signs on.
The keyboard buffering field controls two functions:
Type-ahead:
Lets the user type data faster than it can be sent to the system.
Attention key buffering:
If attention key buffering is on, the Attention key is treated like any other
key. If attention key buffering is not on, pressing the Attention key results
in sending the information to the system even when other workstation
input is inhibited.
Table 65. Possible Values for KBDBUF:
*SYSVAL
The QKBDBUF system value is used.
*NO
The type-ahead feature and Attention-key buffering option are
not active for this user profile.
*TYPEAHEAD
The type-ahead feature is active for this user profile.
*YES
The type-ahead feature and Attention-key buffering option are
active for this user profile.
Maximum Storage
|
|
|
|
CL parameter:
MAXSTG
|
|
Length:
|
|
|
|
You can specify the maximum amount of auxiliary storage that is used to store
permanent objects that are owned by a user profile, including objects placed in the
temporary library (QTEMP) during a job. Maximum storage is specified in
kilobytes (1024 bytes).
|
|
If the storage needed is greater than the maximum amount specified when the user
attempts to create an object, the object is not created.
|
|
|
|
|
|
This provides a total of 15,000 KB of auxiliary storage from the whole system.
|
|
|
|
|
When planning maximum storage for user profiles, consider the following system
functions, which can affect the maximum storage needed by a user:
v A restore operation first assigns the storage to the user doing the restore
operation, and then transfers the objects to the OWNER. Users who do large
restore operations should have MAXSTG(*NOMAX) in their user profiles.
11,0
84
|
|
|
|
|
|
|
|
|
|
|
|
|
|
v The user profile that owns a journal receiver is assigned the storage as the
receiver size grows. If new receivers are created, the storage continues to be
assigned to the user profile that owns the active journal receiver. Users who own
active journal receivers should have MAXSTG(*NOMAX) in their user profiles.
v If a user profile specifies OWNER(*GRPPRF), ownership of any object created by
the user is transferred to the group profile after the object is created. However,
the user creating the object must have adequate storage to contain any created
object before the object ownership is transferred to the group profile.
v The owner of a library is assigned the storage for the descriptions of the objects
that are placed in a library, even when the objects are owned by another user
profile. Examples of such descriptions are text and program references.
v Storage is assigned to the user profile for temporary objects that are used during
the processing of a job. Examples of such objects are commitment control blocks,
file editing spaces, and documents.
|
|
|
|
|
Priority Limit
Add User prompt:
Not shown
CL parameter:
PTYLMT
Length:
1
A batch job has three different priority values:
Run priority:
Determines how the job competes for machine resources when the job is
running. Run priority is determined by the jobs class.
Job priority:
Determines the scheduling priority for a batch job when the job is on the
job queue. Job priority can be set by the job description or on the submit
command.
Output priority:
Determines the scheduling priority for any output created by the job on
the output queue. Output priority can be set by the job description or on
the submit command.
The priority limit in the user profile determines the maximum scheduling priorities
(job priority and output priority) allowed for any jobs the user submits. It controls
priority when the job is submitted, as well as any changes made to priority while
the job is running or waiting in a queue.
The priority limit also limits changes that a user with *JOBCTL special authority
can make to another users job. You cannot give someone elses job a higher
priority than the limit specified in your own user profile.
85
If a batch job runs under a different user profile than the user submitting the job,
the priority limits for the batch job are determined by the profile the job runs
under. If a requested scheduling priority on a submitted job is higher than the
priority limit in the user profile, the priority of the job is reduced to the level
permitted by the user profile.
Table 67. Possible Values for PTYLMT:
3
The default priority limit for user profiles is 3. The default
priority for both job priority and output priority on job
descriptions is 5. Setting the priority limit for the user profile at
3 gives the user the ability to move some jobs ahead of others
on the queues.
priority- limit
Specify a value, 1 through 9. The highest priority is 1; the
lowest priority is 9.
Recommendations: Using the priority values in job descriptions and on the submit
job commands is usually a better way to manage the use of system resources than
changing the priority limit in user profiles.
Use the priority limit in the user profile to control changes that users can make to
submitted jobs. For example, system operators may need a higher priority limit so
that they can move jobs in the queues.
Job Description
Add User prompt:
Not shown
CL parameter:
JOBD
Length
10 (job description name) 10 (library name)
Authority:
*USE for job description, *READ and *EXECUTE for library
When a user signs on, the system looks at the workstation entry in the subsystem
description to determine what job description to use for the interactive job. If the
workstation entry specifies *USRPRF for the job description, the job description in
the user profile is used.
The job description for a batch job is specified when the job is started. It can be
specified by name, or it can be the job description from the user profile under
which the job runs.
A job description contains a specific set of job-related attributes, such as which job
queue to use, scheduling priority, routing data, message queue severity, library list
and output information. The attributes determine how each job is run on the
system.
See the Work Management book for more information about job descriptions and
their uses.
Table 68. Possible Values for JOBD:
QDFTJOBD
The system-supplied job description found in library QGPL is
used. You can use the Display Job Description (DSPJOBD)
command to see the attributes contained in this job description.
job- description- name
Specify the name of the job description, 10 characters or less.
86
Group Profile
Add User prompt:
User Group
CL parameter:
GRPPRF
Length:
10
Authority:
To specify a group when creating or changing a user profile, you must
have *OBJMGT, *OBJOPR, *READ, *ADD, *UPD, and *DLT authority to the
group profile.
Notes: Adopted authority is not used to check for *OBJMGT authority to the
group profile. For more information about adopted authority, see Objects
That Adopt the Owners Authority on page 135.
Specifying a group profile name makes the user a member of the group profile.
The group profile can provide the user with authority to use objects for which the
user does not have specific authority. You may specify up to 15 additional groups
for the user in the Supplemental group profile (SUPGRPPRF) parameter.
When a group profile is specified in a user profile, the user is automatically
granted *OBJMGT, *OBJOPR, *READ, *ADD, *UPD, and *DLT authorities to the
group profile, if the group profile is not already one of the users group profiles.
These authorities are necessary for system functions and should not be removed.
If a profile specified in the GRPPRF parameter is not already a group profile, the
system sets information in the profile marking it as a group profile. The system
also generates a gid for the group profile, if it does not already have one.
See Planning Group Profiles on page 229 for more information about using group
profiles.
Table 70. Possible Values for GRPPRF:
*NONE
No group profile is used with this user profile.
user- profile- name
Specify the name of a group profile of which this user profile is
a member.
87
Owner
Add User prompt:
Not shown
CL parameter:
OWNER
Length:
10
If the user is a member of a group, you use the owner parameter in the user profile
to specify who owns any new objects created by the user. Objects can be owned
either by the user or by the users first group (the value of the GRPPRF
parameter). You can specify the OWNER field only if you have specified the Group
profile field.
Table 71. Possible Values for OWNER:
*USRPRF
This user profile is the OWNER of any new objects it creates.
*GRPPRF
The group profile is made the OWNER of any objects created
by the user and is given all (*ALL) authority to the objects. The
user profile is not given any specific authority to new objects it
creates. If *GRPPRF is specified, you must specify a group
profile name in the GRPPRF parameter, and the GRPAUT
parameter must be *NONE.
Notes:
1. If you give ownership to the group, all members of the
group can change, replace, and delete the object.
2. The *GRPPRF parameter is ignored for all file systems
except QSYS.LIB. In cases where the parameter is ignored,
the user retains ownership of the object.
Group Authority
Add User prompt:
Not shown
CL parameter:
GRPAUT
Length:
10
If the user profile is a member of a group and OWNER(*USRPRF) is specified, the
Group authority field controls what authority is given to the group profile for any
objects created by this user.
Group authority can be specified only when GRPPRF is not *NONE and OWNER
is *USRPRF. Group authority applies to the profile specified in the GRPPRF
parameter. It does not apply to supplemental group profiles specified in the
SUPGRPPRF parameter.
88
See Defining How Information Can Be Accessed on page 120 for a complete
explanation of the authorities that can be granted.
Private authority and primary group authority provide the same access to the
object, but they may have different performance characteristics. Primary Group for
an Object on page 130 explains how primary group authority works.
Supplemental Groups
Add User prompt:
Not shown
CL parameter:
SUPGRPPRF
Length:
150
89
Authority:
To specify supplemental groups when creating or changing a user profile,
you must have *OBJMGT, *OBJOPR, *READ, *ADD, *UPD, and *DLT
authority to each group profile.
Note:
You may specify the names of up to 15 profiles from which this user is to receive
authority. The user becomes a member of each supplemental group profile. The
user cannot have supplemental group profiles if the GRPPRF parameter is *NONE.
When supplemental group profiles are specified in a user profile, the user is
automatically granted *OBJMGT, *OBJOPR, *READ, *ADD, *UPD, and *DLT
authorities to each group profile, if the group profile is not already one of the
users group profiles. These authorities are necessary for system functions and
should not be removed. If a profile specified in the SUPGRPPRF parameter is not
already a group profile, the system sets information in the profile marking it as a
group profile. The system also generates a gid for the group profile, if it does not
already have one.
See Planning Group Profiles on page 229 for more information about using group
profiles.
Table 74. Possible Values for SUPGRPPRF
*NONE
No supplemental groups are used with this user profile.
group- profile- name
Specify up to 15 names of group profiles to be used with this
user profile. These profiles, in addition to the profile specified
in the GRPPRF parameter, are used to give the user access to
objects.
Accounting Code
Add User prompt:
Not shown
CL parameter:
ACGCDE
Length:
15
Job accounting is an optional function used to gather information about the use of
system resources. The accounting level (QACGLVL) system value determines
whether job accounting is active. The accounting code for a job comes from either
the job description or the user profile. The accounting code can also be specified
when a job is running using the Change Accounting Code (CHGACGCDE)
command.
See the Work Management book for more information about job accounting.
Table 75. Possible Values for ACGCDE:
*BLANK
An accounting code of 15 blanks is assigned to this user profile.
accounting- code
Specify a 15-character accounting code. If less than 15
characters are specified, the string is padded with blanks on the
right.
90
Document Password
Add User prompt:
Not shown
CL parameter:
DOCPWD
Length:
8
You can specify a document password for the user to protect the distribution of
personal mail from being viewed by people working on behalf of the user. The
document password is supported by some Document Interchange Architecture
(DIA) products, such as the Displaywriter.
Table 76. Possible Values for DOCPWD:
*NONE
No document password is used by this user.
document- password
Specify a document password for this user. The password must
consist of from 1 through 8 characters (letters A through Z and
numbers 0 through 9). The first character of the document
password must be alphabetic; the remaining characters can be
alphanumeric. Embedded blanks, leading blanks, and special
characters are not allowed.
Message Queue
Add User prompt:
Not shown
CL parameter:
MSGQ
Length:
10 (message queue name) 10 (library name)
Authority:
*USE for message queue, if it exists. *EXECUTE for the message queue
library.
You can specify the name of a message queue for a user. A message queue is an
object on which messages are placed when they are sent to a person or a program.
A message queue is used when a user sends or receives messages. If the message
queue does not exist, it is created when the profile is created or changed. The
message queue is owned by the profile being created or changed. The user creating
the profile is given *ALL authority to the message queue.
If the message queue for a user profile is changed using the Change User Profile
(CHGUSRPRF) command, the previous message queue is not automatically deleted
by the system.
Table 77. Possible Values for MSGQ:
*USRPRF
A message queue with the same name as the user profile name
is used as the message queue for this user. If the message
queue does not exist, it is created in library QUSRSYS.
message- queue-name
Specify the message queue name that is used for this user. If
you specify a message queue name, you must specify the
library parameter.
91
Recommendations: When a user signs on, the message queue in the user profile is
allocated to that users job. If the message queue is already allocated to another
job, the user receives a warning message during sign-on. To avoid this, give each
user profile a unique message queue, preferably with the same name as the user
profile.
Delivery
Add User prompt:
Not shown
CL parameter:
DLVRY
Length:
10
The delivery mode of a message queue determines whether the user is interrupted
when a new message arrives on the queue. The delivery mode specified in the user
profile applies to the users personal message queue. If you change the message
queue delivery in the user profile and the user is signed on, the change takes affect
the next time the user signs on. You can also change the delivery of a message
queue with the Change Message Queue (CHGMSGQ) command.
Table 79. Possible Values for DLVRY:
*NOTIFY
The job that the message queue is assigned to is notified when
a message arrives at the message queue. For interactive jobs at
a workstation, the audible alarm is sounded and the
message-waiting light is turned on. The type of delivery cannot
be changed to *NOTIFY if the message queue is also being
used by another user.
*BREAK
The job that the message queue is assigned to is interrupted
when a message arrives at the message queue. If the job is an
interactive job, the audible alarm is sounded (if the alarm is
installed). The type of delivery cannot be changed to *BREAK if
the message queue is also being used by another user.
*HOLD
The messages are held in the message queue until they are
requested by the user or program.
*DFT
Messages requiring replies are answered with their default
reply; information-only messages are ignored.
Severity
Add User prompt:
Not shown
CL parameter:
SEV
92
Length:
2,0
If a message queue is in *BREAK or *NOTIFY mode, the severity code determines
the lowest-level messages that are delivered to the user. Messages whose severity
is lower than the specified severity code are held in the message queue without the
user being notified.
If you change the message queue severity in the user profile and the user is signed
on, the change takes effect the next time the user signs on. You can also change the
severity of a message queue with the CHGMSGQ command.
Table 80. Possible Values for SEV:
00:
If a severity code is not specified, 00 is used. The user is
notified of all messages, if the message queue is in *NOTIFY or
*BREAK mode.
severity- code
Specify a value, 00 through 99, for the lowest severity code that
causes the user to be notified. Any 2-digit value can be
specified, even if no severity code has been defined for it
(either defined by the system or by the user).
Print Device
Add User prompt:
Default printer
CL parameter:
PRTDEV
Length:
10
You can specify the printer used to print the output for this user. Spooled files are
placed on an output queue with the same name as the printer when the output
queue (OUTQ) is specified as the print device (*DEV).
The print device and output queue information from the user profile are used only
if the printer file specifies *JOB and the job description specifies *USRPRF. For
more information about directing printer output, see the Printer Device Programming
book.
Table 81. Possible Values for PRTDEV:
*WRKSTN
The printer assigned to the users workstation (in the device
description) is used.
*SYSVAL
The default system printer specified in the QPRTDEV system
value is used.
print- device- name
Specify the name of the printer that is used to print the output
for this user.
Output Queue
Add User prompt:
Not shown
CL parameter:
OUTQ
93
Length:
10 (output queue name) 10 (library name)
Authority:
*USE for output queue *EXECUTE for library
Both interactive and batch processing may result in spooled files that are to be sent
to a printer. Spooled files are placed on an output queue. The system can have
many different output queues. An output queue does not have to be attached to a
printer to receive new spooled files.
The print device and output queue information from the user profile are used only
if the printer file specifies *JOB and the job description specifies *USRPRF. For
more information about directing printer output, see the Printer Device Programming
book.
Table 82. Possible Values for OUTQ:
*WRKSTN
The output queue assigned to the users workstation (in the
device description) is used.
*DEV
An output queue with the same name as the print device
specified on the PRTDEV parameter is used.
output- queue- name
Specify the name of the output queue that is to be used. The
output queue must already exist. If an output queue is
specified, the library must be specified also.
Table 83. Possible Values for OUTQ library:
*LIBL
The library list is used to locate the output queue.
*CURLIB
The current library for the job is used to locate the output
queue. If no current library entry exists in the library list,
QGPL is used.
library- name
Specify the library where the output queue is located.
Attention-Key-Handling Program
Add User prompt:
Not shown
CL parameter:
ATNPGM
Length:
10 (program name) 10 (library name)
Authority:
*USE for program
*EXECUTE for library
The Attention-key-handling program (ATNPGM) is the program that is called
when the user presses the Attention (ATTN) key during an interactive job.
The ATNPGM is activated only if the users routing program is QCMD. The
ATNPGM is activated before the initial program is called. If the initial program
changes the ATNPGM, the new ATNPGM remains active only until the initial
program ends. If the Set Attention-Key-Handling Program (SETATNPGM)
command is run from a command line or an application, the new ATNPGM
specified overrides the ATNPGM from the user profile.
94
Note: See Starting an Interactive Job on page 185 for more information about the
processing sequence when a user signs on.
The Limit capabilities field determines if a different Attention-key-handling program
can be specified by the user with the Change Profile (CHGPRF) command.
Table 84. Possible Values for ATNPGM:
*SYSVAL
The QATNPGM system value is used.
*NONE
No Attention-key-handling program is used by this user.
*ASSIST
Operational Assistant Attention Program (QEZMAIN) is used.
program- name
Specify the name of the Attention-key-handling program. If a
program name is specified, a library must be specified.
Table 85. Possible Values for ATNPGM Library:
*LIBL
The library list is used to locate the Attention-key-handling
program.
*CURLIB
The current library for the job is used to locate the
Attention-key-handling program. If no current library entry
exists in the library list, QGPL is used.
library- name:
Specify the library where the Attention-key-handling program
is located.
Sort Sequence
Add User prompt:
Not shown
CL parameter:
SRTSEQ
Length:
10 (value or table name) 10 (library name)
Authority:
*USE for table *EXECUTE for library
You can specify what sort sequence is used for this users output. You can use
system-provided sort tables or create your own. A sort table may be associated
with a particular language identifier on the system.
Table 86. Possible Values for SRTSEQ:
*SYSVAL
The QSRTSEQ system value is used.
*HEX
The standard hexadecimal sort sequence is used for this user.
*LANGIDSHR
The sort sequence table associated with the users language
identifier is used. The table can contain the same weight for
multiple characters.
*LANGIDUNQ
The sort sequence table associated with the users language
identifier is used. The table must contain a unique weight for
each character in the code page.
table-name
Specify the name of the sort sequence table for this user.
Table 87. Possible Values for SRTSEQ Library:
*LIBL
The library list is used to locate the table specified for the
SRTSEQ value.
*CURLIB
The current library for the job is used to locate the table
specified for the SRTSEQ value. If no current library entry
exists in the library list, QGPL is used.
library- name
Specify the library where the sort sequence table is located.
95
Language Identifier
Add User prompt:
Not shown
CL parameter:
LANGID
Length:
10
You can specify the language identifier to be used by the system for the user. To
see a list of language identifiers, press F4 (prompt) on the language identifier
parameter from the Create User Profile display or the Change User Profile display.
Table 88. Possible Values for LANGID:
*SYSVAL:
The system value QLANGID is used to determine the language
identifier.
language- identifier
Specify the language identifier for this user.
96
Job Attributes
Add User prompt:
Not shown
CL parameter:
SETJOBATR
Length:
160
The SETJOBATR field specifies which job attributes are to be taken at job initiation
from the locale specified in the LOCALE parameter.
97
*CCSID
*DATFMT
*DATSEP
*DECFMT
*SRTSEQ
*TIMSEP
Locale
Add User prompt:
Not shown
CL parameter:
LOCALE
Length:
2048
The LOCALE field specifies the path name of the locale that is assigned to the
LANG environment variable for this user.
Table 93. Possible Values for LOCALE:
*SYSVAL
The system value QLOCALE is used to determine the locale
path name to be assigned for this user.
*NONE
No locale is assigned for this user.
*C
The C locale is assigned for this user.
*POSIX
The POSIX locale is assigned for this user.
locale path name
The path name of the locale to be assigned to this user.
User Options
Add User prompt:
Not shown
CL parameter:
USROPT
Length:
240 (10 characters each)
The User options field allows you to customize certain system displays and
functions for the user. You can specify multiple values for the user option
parameter.
98
Recommendations: For most installations, let the system generate a uid for new
users by specifying UID(*GEN). However, if your system is part of a network, you
may need to assign uids to match those assigned on other systems in the network.
Consult your network administrator.
99
Length:
10,0
The integrated file system uses the group identification number (gid) to identify
this profile as a group profile. A profile that is used as a group profile by the
integrated file system must have a gid.
Table 96. Possible Values for GID:
*NONE
This profile does not have a gid.
*GEN
The system generates a unique gid for this profile. The
generated gid will be greater than 100.
gid
A value from 1 to 4294967294 to be assigned as the gid for this
profile. The gid must not be already assigned to another
profile.
Recommendations: For most installations, let the system generate a gid for new
group profiles by specifying GID(*GEN). However, if your system is part of a
network, you may need to assign gids to match those assigned on other systems in
the network. Consult your network administrator.
Do not assign a gid to a user profile that you do not plan to use as a group profile.
In some environments, a user who is signed on and has a gid is restricted from
performing certain functions.
Home Directory
Add User prompt:
Not shown
CL parameter:
HOMEDIR
Length:
2048
The home directory is the users initial working directory for the integrated file
system. The home directory is the users current directory if a different current
directory has not been specified. If the home directory specified in the profile does
not exist when the user signs on, the users home directory is the root (/)
directory.
Table 97. Possible Values for HOMEDIR:
*USRPRF
The home directory assigned to the user is /home/xxxxx, where
xxxxx is the users profile name.
home-directory
The name of the home directory to assign to this user.
Authority
Add User prompt:
Not shown
CL parameter:
AUT
Length:
10
100
The Authority field specifies the public authority to the user profile. The authority
to a profile controls many functions associated with the profile, such as:
Changing it
Displaying it
Deleting it
Submitting a job using it
Specifying it in a job description
Transferring object ownership to it
Adding members, if it is a group profile
Table 98. Possible Values for AUT:
*EXCLUDE
The public is
*ALL
The public is
user profile.
*CHANGE
The public is
*USE
The public is
See Defining How Information Can Be Accessed on page 120 for a complete
explanation of the authorities that can be granted.
Recommendations: To prevent misuse of user profiles that have authority to
critical objects, make sure the public authority to the profiles is *EXCLUDE.
Possible misuses of a profile include submitting a job that runs under that user
profile or changing a program to adopt the authority of that user profile.
Object Auditing
Add User prompt:
Not shown
CL parameter:
OBJAUD
Length:
10
The object auditing value for a user profile works with the object auditing value
for an object to determine whether the users access of an object is audited. Object
auditing for a user profile cannot be specified on any user profile displays. Use the
CHGUSRAUD command to specify object auditing for a user. Only a user with
*AUDIT special authority can use the CHGUSRAUD command.
Table 99. Possible Values for OBJAUD:
*NONE
The OBJAUD value for objects determines whether object
auditing is done for this user.
*CHANGE
If the OBJAUD value for an object specifies *USRPRF, an audit
record is written when this user changes the object.
*ALL
If the OBJAUD value for an object specifies *USRPRF, an audit
record is written when this user changes or reads the object.
Table 100 on page 102 shows how the OBJAUD values for the user and the object
work together:
101
*NONE
*CHANGE
*ALL
*NONE
*USRPRF
*CHANGE
*ALL
None
None
Change
Change and Use
None
Change
Change
Change and Use
None
Change and Use
Change
Change and Use
Planning the Auditing of Object Access on page 263 provides information about
how to use system values and the object auditing values for users and objects to
meet your security auditing needs.
Action Auditing
Add User prompt:
Not shown
CL parameter:
AUDLVL
Length:
640
For an individual user, you can specify which security-relevant actions should be
recorded in the audit journal. The actions specified for an individual user apply in
addition to the actions specified for all users by the QAUDLVL system value.
Action auditing for a user profile cannot be specified on any user profile displays.
It is defined using the CHGUSRAUD command. Only a user with *AUDIT special
authority can use the CHGUSRAUD command.
Table 101. Possible Values for AUDLVL:
*NONE
The QAUDLVL system value controls action auditing for this
user. No additional auditing is done.
*CMD
Command strings are logged. *CMD can be specified only for
individual users. Command string auditing is not available as a
system-wide option using the QAUDLVL system value.
*CREATE
Object create operations are logged.
*DELETE
Object delete operations are logged.
*JOBDTA
Job changes are logged.
*OBJMGT
Object move and rename operations are logged.
*OFCSRV
Changes to the system distribution directory and office mail
actions are logged.
*PGMADP
Obtaining authority to an object through a program that adopts
authority is logged.
*SAVRST
Save and restore operations are logged.
*SECURITY
Security-related functions are logged.
*SERVICE
Using service tools is logged.
*SPLFDTA
Actions performed on spooled files are logged.
*SYSMGT
Use of system management functions is logged.
Planning the Auditing of Actions on page 253 provides information about how to
use system values and the action auditing for users to meet your security auditing
needs.
102
Private Authorities
All the private authorities a user has to objects are stored with the user profile.
When a user needs authority to an object, the users private authorities may be
searched. Flowchart 3: How User Authority to an Object Is Checked on page 161
provides more information about authority checking.
You can display a users private authorities using the Display User Profile
command: DSPUSRPRF user-profile-name TYPE(*OBJAUT). To change a users
private authorities, you use the commands that work with object authorities, such
as Edit Object Authority (EDTOBJAUT).
You can copy all the private authorities from one user profile to another using the
Grant User Authority (GRTUSRAUT) command. See Copying Authority from a
User on page 153 for more information.
Digital ID Authentication
The iSeries security infrastructure allows x.509 digital certificates to be used for
identification. The digital certificates allow users to secure communications and
ensure message integrity.
Chapter 4. User Profiles
103
The digital ID APIs create, distribute, and manage digital certificates associated
with user profiles. See the API topic in the Information Center (see Prerequisite
and related information on page xvi) for details about the following APIs:
v
v
v
v
v
v
v
v
|
|
|
|
|
|
|
|
|
|
|
|
|
|
104
|
|
will access the Work with User Enrollment display. If *INTERMED assistance level
is specified, you will access the Work with User Profiles display.
You can specify the ASTLVL (assistance level) parameter on the command. If you
do not specify ASTLVL, the system uses the assistance level stored with your user
profile.
On the Work with User Profiles display, type 1 and the name of the profile you
want to create:
|
|
|
|
|
|
|
|
|
|
|
|
||
5=Display
Text
Sales and Marketing Departme
Warehouse Department
|
You see the Create User Profile display:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
NEWUSER
NEWUSER1
*YES
*ENABLED
*USER
*SYSVAL
*CRTDFT
*NONE
MAIN
QSYS
*NO
|
The Create User Profile display shows all the fields in the user profile. Use F10
(Additional parameters) and page down to enter more information. Use F11
(Display keywords) to see the parameter names.
The Create User Profile display does not add the user to the system directory.
105
User
NEWUSER
DPTSM
DPTWH
Description
Sales and Marketing Departme
Warehouse Department
Add User
Type choices below, then press Enter.
User . . . . . .
User description
Password . . . .
Type of user . .
User group . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
NEWUSER
NEWUSER
*USER
*NONE
N
Y
Default
Default
Sign on
Library
*WRKSTN
*NONE
library
printer
program
. . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
First menu . . . . . . .
Library . . . . . . . .
F1=Help
F3=Exit
F5=Refresh
F12=Cancel
The Add User display is designed for a security administrator without a technical
background. It does not show all of the fields in the user profile. Default values are
used for all fields that are not shown.
Note: If you use the Add User display, you are limited to eight-character user
profile names.
Page down to see the second display:
106
Add User
Type choices below, then press Enter.
Attention key program . .
Library . . . . . . . .
*SYSVAL
The Add user display automatically adds an entry in the system directory with the
same user ID as the user profile name (the first eight characters) and an address of
the system name.
The main menu also includes user Options 5159. These additional options
(Options 51--59) are processed similar to Option 50, except the default values for
the following fields are blank:
v Text for menu options
v User program
v Library
On the Work with User Profiles display, type 3 in front of the profile you want to
copy. You see the Create User Profile display:
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
>
>
>
>
>
>
>
>
>
>
>
Name
Name
*NO, *YES
*ENABLED,
*USER,
*SYSVAL,
Name,
Name,
Name,
ICMAIN
Name,
ICPGMLIB
Name,
*NO
*NO,
Warehouse Department
*USRPRF
*NO
*ENABLED
*USER
*SYSVAL
DPTWH
*NONE
107
All the values from the copy-from user profile are shown on the Create User
Profile display, except these fields:
Home directory
*USRPRF
Locale job attributes
Locale job attributes
Locale Locale
User profile
Blank. Must be filled in.
Password
*USRPRF
Message queue
*USRPRF
Document password
*NONE
User Identification Number
*GEN
Group Identification Number
*NONE
Authority
*EXCLUDE
You can change any fields on the Create User Profile display. Private authorities of
the copy-from profile are not copied. In addition, internal objects containing user
preferences and other information about the user will not be copied.
On the Work with User Enrollment display, type 3 in front of the profile you want
to copy. You see the Copy User display:
Copy User
Copy from user . . . . :
DPTWH
108
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Warehouse Department
USER
N
Y
Default library
Default printer
Sign on program
Library . . .
DPTWH
PRT04
*NONE
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
All values from the copy-from profile appear on the Add User display, except the
following:
User
Password
Blank. If you do not enter a value, the profile is created with the password
equal to the default value specified for the PASSWORD parameter of the
CRTUSRPRF command.
You can change any fields on the Copy User display. User profile fields that do not
appear on the basic assistance level version are still copied from the copy-from
profile, with the following exceptions:
Message queue
*USRPRF
Document password
*NONE
User Identification Number
*GEN
Group Identification Number
*NONE
Authority
*EXCLUDE
Private authorities of the copy-from profile are not copied.
109
You cannot delete a user profile if it is the primary group for any objects. When
you use the intermediate assistance level to delete a user profile, you can change
or remove the primary group for objects. You can use the DSPUSRPRF command
with the *OBJPGP (object primary group) option to list any objects for which a
profile is the primary group.
When you delete a user profile, the user is removed from all distribution lists and
from the system directory.
You do not need to change ownership of or delete the users message queue. The
system automatically deletes the message queue when the profile is deleted.
You cannot delete a group profile that has members. To list the members of a
group profile, type DSPUSRPRF group-profile-name *GRPMBR. Change the GRPPRF
field in each member profile before deleting the group profile.
. > HOGANR
Name
*CHGOWN
WILLISR
.
.
.
*NOCHG
*NOCHG, *PGP
You can delete all the owned objects or transfer them to a new owner. If you want
to handle owned objects individually, you can use the Work with Objects by
Owner (WRKOBJOWN) command. You can change the primary group for all
objects for which the group profile is the primary group. If you want to handle
objects individually, you can use the Work with Objects by Primary Group
(WRKOBJPGP) command. The displays for both commands are similar:
110
|
|
|
|
|
|
|
|
|
|
|
|
|
||
HOGANR
Library
QUSRSYS
DPTWH
DPTWH
Type
*MSGQ
*PGM
*PGM
Attribute
ASP
Device
*SYSBAS
*SYSBAS
*SYSBAS
From the Work with User Enrollment display, type 4 (Remove) in front of the
profile you want to delete. You see the Remove User display:
Remove User
User . . . . . . . . . . . :
User description . . . . . :
HOGANR
Sales and Marketing Department
To change the ownership of all objects before deleting the profile, select option 1.
You see a display prompting you for the new owner.
To handle the objects individually, select option 2. You see a detailed Remove User
display:
Remove User
User . . . . . . . . . . . :
User description . . . . . :
New owner . . . . . . . . .
HOGANR
Hogan, Richard - Warehouse DPT
Name, F4 for list
Library
QUSRSYS
DPTWH
DPTWH
Description
HOGANR message queue
Inventory Query, on-hand report
Inventory Query, on-order report
111
Use the options on the display to delete objects or transfer them to a new owner.
When all objects have been removed from the display, you can delete the profile.
Notes:
1. You can use F13 to delete all the objects owned by the user profile.
2. Spooled files do not appear on the Work with Objects by Owner display. You
can delete a user profile even though that profile still owns spooled files. After
you have deleted a user profile, use the Work with Spooled Files (WRKSPLF)
command to locate and delete any spooled files owned by the user profile, if
they are no longer needed.
3. Any objects for which the deleted user profile was the primary group will have
a primary group of *NONE.
DPTAR
112
PGM &PROFILE
DCL VAR(&PROFILE) TYPE(*CHAR) LEN(10)
CHGUSRPRF USRPRF(&PROFILE) STATUS(*ENABLED)
ENDPGM
QSECOFR
*NO GROUP
User
Profile
Password
Last
Changed
ANDERSR
VINCENT
08/04/0x
09/15/0x
Anders, Roger
Vincent, Mark
ANDERSR
HOGANR
QUINN
08/04/0x
09/06/0x
09/06/0x
Anders, Roger
Hogan, Richard
Quinn, Rose
JONESS
HARRISON
09/20/0x
08/29/0x
Jones, Sharon
Harrison, Ken
DPTSM
DPTWH
09/05/0x
09/18/0x
No
Password
X
X
Text
By pressing F11, you are able to see which user profiles have passwords defined
for use at the various password levels.
Group
Profile
Password Password
Password
Password
Last
for level for level
for
Changed
0 or 1
2 or 3
NetServer
04/21/0x
*YES
*NO
*YES
07/07/0x
*YES
*YES
*YES
05/15/0x
*YES
*YES
*YES
05/15/0x
*NO
*NO
*NO
05/18/0x
*YES
*NO
*YES
04/20/0x
*YES
*NO
*YES
03/30/0x
*YES
*NO
*YES
08/04/0x
*YES
*YES
*YES
03/16/0x
*YES
*NO
*YES
113
114
3. Change the primary group of all objects that SMITHM is the primary group of
using the Work with Objects by Primary Group (WRKOBJPGP) command:
WRKOBJPGP PGP(SMITHM)
Enter option 9 on all objects that need their primary group changed and enter
NEWPGP (JONESM) on the command line.
Note: JONESM must have a gid assigned using the GID parameter on the
Create or Change User Profile (CRTUSRPRF or CHGUSRPRF) command.
4. Display the SMITHM user profile using the Display User Profile (DSPUSRPRF)
command:
DSPUSRPRF USRPRF(SMITHM)
HOGANR
JONESS
*SAME
*CMD
*SERVICE
You can specify the auditing characteristics for more than one user at a time by
listing user profile names.
The AUDLVL (user action auditing) parameter can have more than one value. The
values you specify on this command replace the current AUDLVL values for the
users. The values you specify are not added to the current AUDLVL values for the
users.
You can use the Display User Profile (DSPUSRPRF) command to see audit
characteristics for a user.
115
116
When you install a new release of the operating system, passwords for
IBM-supplied profiles are not changed. If profiles such as QPGMR and QSYSOPR
have passwords, those passwords are not set to *NONE automatically.
Appendix B, IBM-Supplied User Profiles on page 291 contains a complete list of
all the IBM-supplied user profiles and the field values for each profile.
Note: IBM-supplied profiles are provided, but they are used by the Operating
System/400. Therefore, signing on with these profiles or using the profiles to
own user (non-IBM supplied ) objects is not recommended.
117
grant or revoke privileges, or create service tools user IDs. Note: Information
regarding Service tools has been moved to the Information Center.
v Password management enhancements
The server is shipped with limited ability to change default and expired
passwords. This means that you cannot change service tools user IDs that have
default and expired passwords through the Change Service Tools User ID
(QSYCHGDS) API, nor can you change their passwords through SST. You can
only change a service tools user ID with a default and expired password
through DST. And, you can change the setting to allow default and expired
passwords to be changed. Also, you can use the new Start service tools (STRSST)
privilege to create a service tools user ID that can access DST, but can be
restricted from accessing SST.
v Terminology changes
The textual data and other documentation have been changed to reflect the new
service tools terminology. Specifically, the term service tools user IDs replaces
previous terms, such as DST user profiles, DST user IDs, service tools user
profiles, or variations of these names.
For information on how to work with Service tools, see the Information Center
topic, Service tools (Security>Service tools). See Prerequisite and related
information on page xvi for more information on accessing the Information
Center.
System Password
The system password is used to authorize system model changes, certain service
conditions, and ownership changes. If these changes have occurred on your
system, you may be prompted for the system password when you perform an IPL.
118
119
Every object on the system has an owner. The owner has *ALL authority to the
object by default. However, the owners authority to the object can be changed or
removed. The owners authority to the object is not considered private authority.
Primary Group Authority:
You can specify a primary group for an object and the authority the primary group
has to the object. Primary group authority is stored with the object and may
provide better performance than private authority granted to a group profile. Only
a user profile with a group identification number (gid) may be the primary group
for an object. Primary group authority is not considered private authority.
120
Authority
Name
Functions Allowed
Object Authorities:
*OBJOPR
Object Operational
*OBJMGT
Object Management
*OBJEXIST
Object Existence
*OBJALTER
Object Alter
*OBJREF
Object Reference
*AUTLMGT
Authorization List
Management
Name
Functions Allowed
Data Authorities:
*READ
Read
*ADD
Add
*UPD
Update
*DLT
Delete
*EXECUTE
Execute
Field Authorities:
*Mgt
*Alter
*Ref
Management
Alter
Reference
*Read
Read
*Add
Add
*Update
Update
If a user has save system (*SAVSYS) special authority, object existence authority is
not required to perform save and restore operations on the object.
See the topic Authorization List Management on page 127 for more information.
*ALL
*CHANGE
*USE
*EXCLUDE
Object Authorities
*OBJOPR
*OBJMGT
*OBJEXIST
*OBJALTER
*OBJREF
X
X
X
X
X
Data Authorities
*READ
*ADD
X
X
X
X
121
*ALL
*UPD
*DLT
*EXECUTE
*CHANGE
X
X
X
*USE
*EXCLUDE
X
X
X
Table 104 shows additional system-defined authorities that are available using the
WRKAUT and CHGAUT commands:
Table 104. System-Defined Authority
Authority
Object Authorities
*OBJOPR
*OBJMGT
*OBJEXIST
*OBJALTER
*OBJREF
Data Authorities
*READ
*ADD
*UPD
*DLT
*EXECUTE
*RWX
*RW
*RX
*R
*WX
X
X
X
X
X
X
X
X
X
*W
*X
X
X
X
X
X
X
X
The LAN Server licensed program uses access control lists to manage authority. A
users authorities are called permissions. Table 105 shows how the LAN Server
permissions map to object and data authorities:
Table 105. LAN Server Permissions
Authority
*EXCLUDE
Object Authorities
*OBJOPR
*OBJMGT
*OBJEXIST
*OBJALTER
*OBJREF
Data Authorities
*READ
*ADD
*UPD
*DLT
*EXECUTE
122
Unless NONE is specified for a user in the access control list, the user is
implicitly given *OBJOPR.
Library Security
Most objects on the system reside in libraries. To access an object, you need
authority both to the object itself and the library in which the object resides. For
most operations, including deleting an object, *USE authority to the object library
is sufficient (in addition to the authority required for the object). Creating a new
object requires *ADD authority to the object library. Appendix D shows what
authority is required by CL commands for objects and the object libraries.
Using library security is one technique for protecting information while
maintaining a simple security scheme. For example, to secure confidential
information for a set of applications, you could do the following:
v Use a library to store all confidential files for a particular group of applications.
v Ensure that public authority is sufficient for all objects (in the library) that are
used by applications (*USE or *CHANGE).
v Restrict public authority to the library itself (*EXCLUDE).
v Give selected groups or individuals authority to the library (*USE, or *ADD if
the applications require it).
Although library security is a simple, effective method for protecting information,
it may not be adequate for data with high security requirements. Highly sensitive
objects should be secured individually or with an authorization list, rather than
relying on library security.
Field Authorities
Field authorities are now supported for database files. Authorities supported are
Reference and Update. You can only administer these authorities through the SQL
Chapter 5. Resource Security
123
statements, GRANT and REVOKE. You can display these authorities through the
Display Object Authority (DSPOBJAUT) and the Edit Object Authority
(EDTOBJAUT) commands. You can only display the field authorities with the
EDTOBJAUT command; you cannot edit them.
|
Display Object Authority
Object . . . . . :
Library. . . . :
Object type. . . :
PLMITXT
RLN
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP Device . . . . :
PGMR1
DPTAR
*SYSBAS
Figure 4. Display Object Authority display showing F16=Display field authorities. This function
key will be displayed when a database file has field authorities.
124
Field4
User
PGMR1
USER1
USER2
USER3
*PUBLIC
PGMR1
USER1
USER2
USER3
*PUBLIC
PLMITXT
RLN
*FILE
Owner . . . . . . . :
Primary group . . . :
Object
Authority
*ALL
*Use
USER DEF
USER DEF
*CHANGE
*ALL
*Use
USER DEF
USER DEF
*CHANGE
PGMR1
*NONE
Figure 5. Display Field Authority display. When F17=Position to, is pressed the Position the
List prompt will be displayed. If F16 is pressed, the previous position to operation will be
repeated
125
Library QUSER38 is not shipped with the operating system. However, it can be
created by anyone with enough authority to create a library.
See the System/38 Environment Programming manual for more information about the
System/38 Environment.
Directory Security
When accessing an object in a directory, you must have authority to all the
directories in the path containing the object. You must also have the necessary
authority to the object to perform the operation you requested.
You may want to use directory security in the same way that you use library
security. Limit access to directories and use public authority to the objects within
the directory. Limiting the number of private authorities defined for objects
improves the performance of the authority checking process.
126
the object. In some cases, when you install a new release of the operating system,
all the objects in the QSYS library are replaced. The association between the objects
and your authorization list would be lost.
See the topic Planning Authorization Lists on page 227 for examples of how to
use authorization lists.
127
CRTDTAARA DTAARA(CUSTLIB/DTA1) +
TYPE(*CHAR) AUT(*LIBCRTAUT)
The default CRTAUT value for a library is *SYSVAL. Any new objects created in
the library using AUT(*LIBCRTAUT) have public authority set to the value of the
QCRTAUT system value. The QCRTAUT system value is shipped as *CHANGE.
For example, assume the ITEMLIB library has a CRTAUT value of *SYSVAL. This
command creates the DTA2 data area with public authority of change:
CRTDTAARA DTAARA(ITEMLIB/DTA2) +
TYPE(*CHAR) AUT(*LIBCRTAUT)
Assigning Authority and Ownership to New Objects on page 131 shows more
examples of how the system assigns ownership and authority to new objects.
Attention: Several IBM-supplied libraries, including QSYS, have a CRTAUT value
of *SYSVAL. If you change QCRTAUT to something other than *CHANGE, you
may encounter problems. For example, devices are created in the QSYS library. The
default when creating devices is AUT(*LIBCRTAUT). The CRTAUT value for the
QSYS library is *SYSVAL. If QCRTAUT is set to *USE or *EXCLUDE, public
authority is not sufficient to allow sign-on at new devices.
The CRTAUT value for a library can also be set to an authorization list name. Any
new object created in the library with AUT(*LIBCRTAUT) is secured by the
authorization list. The public authority for the object is set to *AUTL.
The CRTAUT value of the library is not used during a move (MOVOBJ), create
duplicate (CRTDUPOBJ), or restore of an object into the library. The public
authority of the existing object is used.
If the REPLACE (*YES) parameter is used on the create command, then the
authority of the existing object is used instead of the CRTAUT value of the library.
Object Ownership
Each object is assigned an owner when it is created. The owner is either the user
who creates the object or the group profile if the member user profile has specified
that the group profile should be the owner of the object. When the object is
created, the owner is given all the object and data authorities to the object.
128
129
The group authority type (GRPAUTTYP) field in the user profile determines whether
the group 1) becomes the primary group for the object or 2) is given private
authority to the object. Assigning Authority and Ownership to New Objects on
page 131 shows several examples.
If the user who owns the object changes to a different user group, the original
group profile still retains authority to any objects created.
Even if the Owner field in a user profile is *GRPPRF, the user must still have
sufficient storage to hold a new object while it is being created. After it is created,
ownership is transferred to the group profile. The MAXSTG parameter in the user
profile determines how much auxiliary storage a user is allowed.
Evaluate the objects a user might create, such as query programs, when choosing
between group and individual user ownership:
v If the user moves to a different department and a different user group, should
the user still own the objects?
v Is it important to know who creates objects? The object authority displays show
the object owner, not the user who created the object.
Note: The Display Object Description display shows the object creator.
If the audit journal function is active, a Create Object (CO) entry is written to the
QAUDJRN audit journal at the time an object is created. This entry identifies the
creating user profile. The entry is written only if the QAUDLVL system value
specifies *CREATE and the QAUDCTL system value includes *AUDLVL.
130
v If an owning profile becomes damaged and is deleted, its objects no longer have
an owner. Using the Reclaim Storage (RCLSTG) command assigns ownership of
these objects to the default owner (QDFTOWN) user profile.
v If an object is restored and the owner profile does not exist.
v If a program that needs to be created again is restored, but the program creation
is not successful. See the topic Validation of Programs Being Restored on
page 17 for more information about which conditions cause ownership to be
assigned to QDFTOWN.
v If the maximum storage limit is exceeded for the user profile that owns an
authority holder that has the same name as a file being moved, renamed, or
whose library is being renamed.
The system supplies the QDFTOWN user profile because all objects must have an
owner. When the system is shipped, only a user with *ALLOBJ special authority
can display and access this user profile and transfer ownership of objects
associated with the QDFTOWN user profile. You can grant other users authority to
the QDFTOWN profile. QDFTOWN user profile is intended for system use only.
You should not design your security such that QDFTOWN normally owns object.
131
132
133
134
135
QCMD
.
.
.
PGMA
QCMD
.
.
.
PGMA
PGMB
Because PGMA remains in the program stack after PGMB is called, PGMB
uses the adopted authority of PGMA. (The use adopted authority
(USEADPAUT) parameter can override this. See Programs That Ignore
Adopted Authority on page 139 for more information about the
USEADPAUT parameter.)
If PGMA starts PGMB using the Transfer Control (TFRCTL) command, the
program stacks look like this:
136
QCMD
.
.
.
PGMA
QCMD
.
.
.
PGMB
PGMB does not use the adopted authority of PGMA, because PGMA is no
longer in the program stack.
v If the program running under adopted authority is interrupted, the use of
adopted authority is suspended. The following functions do not use adopted
authority:
System request
Attention key (If a Transfer to Group Job (TFRGRPJOB) command is running,
adopted authority is not passed to the group job.)
Break-message-handling program
Debug functions
Note: Adopted authority is immediately interrupted by the attention key or a
group job request. The user must have authority to the
attention-key-handling program or the group job initial program, or the
attempt fails.
v
v
For example, USERA runs the program PGM1, which adopts the authority of
USERB. PGM1 uses the SETATNPGM command and specifies PGM2. USERB has
*USE authority to PGM2. USERA has *EXCLUDE authority to PGM2. The
SETATNPGM function is successful because it is run using adopted authority.
USERA receives an authority error when attempting to use the attention key
because USERBs authority is no longer active.
If a program that uses adopted authority submits a job, that submitted job does
not have the adopted authority of the submitting program.
When a trigger program or exit point program is called, adopted authority from
previous programs in the call stack will not be used as a source of authority for
the trigger program or exit point program.
The program adopt function is not used when you use the Change Job
(CHGJOB) command to change the output queue for a job. The user profile
making the change must have authority to the new output queue.
Any objects created, including spooled files that may contain confidential data,
are owned by the user of the program or by the users group profile, not by the
owner of the program.
v Adopted authority can be specified on either the command that creates the
program (CRTxxxPGM) or on the Change Program (CHGPGM) command.
v If a program is created using REPLACE(*YES) on the CRTxxxPGM command,
the new copy of the program has the same USRPRF, USEADPAUT, and AUT
values as the replaced program. The USRPRF and AUT parameters specified on
the CRTxxxPGM parameter are ignored.
v Only the owner of the program can specify REPLACE(*YES) on the CRTxxxPGM
command when USRPRF(*OWNER) is specified on the original program.
v Only a user who owns the program or has *ALLOBJ and *SECADM special
authorities can change the value of the USRPRF parameter.
137
138
Authority Holders
An authority holder is a tool for keeping the authorities for a program-described
database file that does not currently exist on the system. Its primary use is for
System/36 environment applications, which often delete program-described files
and create them again.
|
|
An authority holder can be created for a file that already exists or for a file that
does not exist, using the Create Authority Holder (CRTAUTHLR) command. The
following applies to authority holders:
v Authority holders can only secure files in the system auxiliary storage pool
(ASP) or a basic user ASP. They cannot secure files in an independent ASP.
v The authority holder is associated with a specific file and library. It has the same
name as the file.
v Authority holders can be used only for program-described database files and
logical files created in the S/36 environment.
v Once the authority holder is created, you add private authorities for it like a file.
Use the commands to grant, revoke, and display object authorities, and specify
object type *FILE. On the object authority displays, the authority holder is
indistinguishable from the file itself. The displays do not indicate whether the
file exists nor do they show that the file has an authority holder.
v If a file is associated with an authority holder, the authorities defined for the
authority holder are used during authority checking. Any private authorities
defined for the file are ignored.
139
140
Authority Displays
Four displays show object authorities:
Display Object Authority display
Edit Object Authority display
Display Authority display
Work with Authority display
This section describes some characteristics of these displays. Figure 12 shows the
basic version of the Display Object Authority display:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
CUSTNO
CUSTLIB
*DTAARA
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . :
PGMR1
DPTAR
*SYSBAS
*NONE
Object
User
Group
Authority
PGMR1
*ALL
DPTAR
*CHANGE
DPTSM
*USE
*PUBLIC
*EXCLUDE
F3=Exit F11=Display detail object authorities F12=Cancel
F17=Top
The system-defined names of the authorities are shown on this display. F11 acts as
a toggle between this and two other versions of the display. One shows detailed
object authorities:
141
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
||
|
||
CUSTNO
CUSTLIB
*DTAARA
Owner . . . . . . :
Primary group . . . :
ASP device . . . :
. . . . . . . . . :
PGMR1
DPTAR
*SYSBAS
*NONE
Object
----------Object----------User
Group
Authority Opr Mgt Exist Alter Ref
PGMR1
*ALL
X
X
X
X
X
DPTAR
*CHANGE
X
DPTSM
*USE
X
*PUBLIC
*EXCLUDE
X
.
.
.
F3=Exit F11=Display data authorities F12=Cancel F17=Top F18=Bottom
CUSTNO
CUSTLIB
*DTAARA
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . :
Group
PGMR1
DPTAR
*SYSBAS
*NONE
Object
---------------Data--------------Authority Read Add Update Delete Execute
*ALL
X
X
X
X
X
*CHANGE
X
X
X
X
X
*USE
X
X
*EXCLUDE
If you have *OBJMGT authority to an object, you see all private authorities for that
object. If you do not have *OBJMGT authority, you see only your own sources of
authority for the object.
For example, if USERA displays authority for the CUSTNO data area, only public
authority is shown.
If USERB, who is a member of the DPTAR group profile, displays the authority for
the CUSTNO data area, it looks like this:
142
|
|
|
|
|
|
|
|
|
|
|
|
||
CUSTNO
CUSTLIB
*DTAARA
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . :
Group
DPTAR
PGMR1
DPTAR
*SYSBAS
*NONE
Object
Authority
*CHANGE
If USERB runs a program that adopts the authority of PGMR1 and displays the
authority for the CUSTNO data area, it looks like this:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
CUSTNO
CUSTLIB
*DTAARA
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . :
Group
DPTAR
PGMR1
DPTAR
*SYSBAS
*NONE
Object
Authority
*ALL
*CHANGE
*USE
*EXCLUDE
USER DEF
The *ADOPTED authority indicates only the additional authority received from the
program owner. USERB receives from PGMR1 all the authorities that are not
included in *CHANGE. The display shows all private authorities because USERB
has adopted *OBJMGT. The detailed display looks like this:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CUSTNO
CUSTLIB
*DTAARA
Owner . . . . . . . :
Primary group . . . :
ASP device
. . . . :
PGMR1
DPTAR
*SYSBAS
*NONE
Object
-----------Object----------User
Group
Authority Opr Mgt Exist Alter Ref
PGMR1
*ALL
X
X
X
X
X
*GROUP
DPTAR
*CHANGE
X
DPTSM
*USE
X
*PUBLIC
*EXCLUDE
*ADOPTED
USER DEF
X
X
X
X
F3=Exit F11=Display data authorities F12=Cancel F17=Top F18=Bottom
143
If the user option (USROPT) field in USERBs user profile includes *EXPERT, this is
how the display looks:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CUSTNO
CUSTLIB
*DTAARA
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . .:
PGMR1
DPTAR
*SYSBAS
*NONE
OBJECT
-----Object------ ------Data-------Authority
O
M
E
A
R
R
A
U
D
E
*ALL
X
X
X
X
X
X
X
X
X
X
*CHANGE
X
X
X
X
X
X
*USE
X
X
X
*EXCLUDE
USER DEF
X
X
X
X
Authority Reports
Several reports are available to help you monitor your security implementation.
For example, you can monitor objects with *PUBLIC authority other than
*EXCLUDE and objects with private authorities with the following commands:
v Print Public Authority (PRTPUBAUT)
v Print Private Authority (PRTPVTAUT)
For more information about security tools, see the Tips and Tools for Securing Your
iSeries.
144
TESTLIB
QSYS
*LIB
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . :
PGMR1
*NONE
*SYSBAS
LIBLST
Object
Authority
*ALL
*AUTL
Group
v Because an authorization list was specified for the AUT parameter, public
authority is set to *AUTL.
v The user entering the CRTLIB command owns the library, unless the users
profile specifies OWNER(GRPPRF). The owner is automatically given *ALL
authority.
v The CRTAUT value is not shown on the object authority displays. Use the
Display Library Description (DSPLIBD) command to see the CRTAUT value for
a library.
|
|
|
|
|
|
|
|
|
|
|
||
CUSTLIB
Type . . . . . . . . .
ASP number . . . . . .
ASP device . . . . . .
Create authority . . .
Create object auditing
Text description . . .
PROD
1
*SYSBAS
*OBJLST
*SYSVAL
Customer Rec
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
:
:
:
:
:
:
Creating Objects
When you create a new object, you can either specify the authority (AUT) or use
the default, *LIBCRTAUT. If PGMR1 enters this command:
CRTDTAARA (TESTLIB/DTA1) +
TYPE(*CHAR)
145
DTA1
TESTLIB
*DTAARA
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
Group
PGRM1
*NONE
*SYSBAS
OBJLST
Object
Authority
*ALL
*AUTL
The authorization list (OBJLST) comes from the CRTAUT parameter that was
specified when TESTLIB was created.
If PGMR1 enters this command:
CRTDTAARA (TESTLIB/DTA2) AUT(*CHANGE) +
TYPE(*CHAR)
DTA2
TESTLIB
*DTAARA
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
Group
PGRM1
*NONE
*SYSBAS
*NONE
Object
Authority
*ALL
*CHANGE
146
DTA1
TESTLIB
*DTAARA
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
PGMR1
*NONE
*SYSBAS
Group
OBJLST
Object
Authority
*ALL
*AUTL
147
CONTRACTS
TESTLIB
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
PGMR1
*NONE
*SYSBAS
Group
OBJECT
Authority
USER DEF
*AUTL
Opr
X
LIST2
You can press F11 (Display data authorities) to view or change the data authorities:
CONTRACTS
TESTLIB
*FIL
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
PGMR1
*NONE
*SYSBAS
Group
LIST2
OBJECT
---------------Data--------------Authority Read Add Update Delete Execute
USER DEF
X
X
X
X
X
*AUTL
DTA1
TESTLIB
Object
Authority
*USE
*CHANGE
*ALL
148
override *EXCLUDE authority. Removing a users authority means the user has no
specific authority to the object. The user can gain access through a group profile,
an authorization list, public authority, *ALLOBJ special authority, or adopted
authority.
You can remove a users authority using the Edit Object Authority display. Type
blanks in the Object Authority field for the user and press the Enter key. The user
is removed from the display. You can also use the Revoke Object Authority
(RVKOBJAUT) command. Either revoke the specific authority the user has or
revoke *ALL authority for the user.
Note: The RVKOBJAUT command revokes only the authority you specify. For
example, USERB has *ALL authority to FILEB in library LIBB. You revoke
*CHANGE authority:
RVKOBJAUT OBJ(LIBB/FILEB) OBJTYPE(*FILE) +
USER(*USERB) AUT(*CHANGE)
FILEB
LIBB
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . :
Group
PGMR1
*NONE
*SYSBAS
*NONE
Object
--------Object-----------Authority Read Add Update Delete Execute
USER DEF
X
X
X
X
FILEB
LIBB
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
tion list . . . . . . . . . . . .
User
PGMR1
Group
PGMR1
*NONE
*SYSBAS
*NONE
Object
---------------Data--------------Authority Read Add Update Delete Execute
USER DEF
149
whether the change was made. Authority changes require an exclusive lock on the
object and cannot be made when an object is in use. Print your job log for a record
of changes attempted and made.
v To give all the objects in the TESTLIB library a public authority of *USE:
*ALL
TESTLIB
*ALL
*
*PUBLIC
*USE
This example for the GRTOBJAUT command gives the authority you specify, but
it does not remove any authority that is greater than you specified. If some
objects in the TESTLIB library have public authority *CHANGE, the command
just shown would not reduce their public authority to *USE. To make sure that
all objects in TESTLIB have a public authority of *USE, use the GRTOBJAUT
command with the REPLACE parameter.
GRTOBJAUT OBJ(TESTLIB/*ALL) OBJTYPE(*ALL) +
USER(*PUBLIC) REPLACE(*YES)
The REPLACE parameter indicates whether the authorities you specify replaces
the existing authority for the user. The default value of REPLACE(*NO) gives
the authority that you specify, but it does not remove any authority that is
greater than the authority you specify, unless you are granting *EXCLUDE
authority.
These commands set public authority only for objects that currently exist in the
library. To set the public authority for any new objects that are created later, use
the CRTAUT parameter on the library description.
v To give *ALL authority to the work files in the TESTLIB library to users AMES
and SMITHR. In this example, work files all start with the characters WRK:
WRK*
TESTLIB
*FILE
*
AMES
SMITHR
*ALL
This command uses a generic name to specify the files. You specify a generic
name by typing a character string followed by an asterisk (*). Online information
tells which parameters of a command allow a generic name.
150
v To secure all the files starting with the characters AR* using an authorization list
called ARLST1 and have the files get their public authority from the list, use the
following two commands:
1. Secure the files with the authorization list using the GRTOBJAUT command:
AR*
TESTLIB
*FILE
*
.
.
.
Authorization list . . . . . . .
ARLST1
2. Set public authority for the files to *AUTL, using the GRTOBJAUT command:
AR*
TESTLIB
*FILE
*
*PUBLIC
*AUTL
151
OLDOWNER
Object
COPGMMSG
CUSTMAS
CUSTMSGQ
ITEMMSGQ
Library
COPGMLIB
CUSTLIB
CUSTLIB
ITEMLIB
Parameters or command
===> NEWOWN(OWNIC)
F3=Exit
F4=Prompt
F5=Refresh
F18=Bottom
Type
*MSGQ
*FILE
*MSGQ
*MSGQ
Attribute
ASP
Device
*SYSBAS
*SYSBAS
*SYSBAS
*SYSBAS
F9=Retrieve
When you change ownership using either method, you can choose to remove the
previous owners authority to the object. The default for the CUROWNAUT
(current owner authority) parameter is *REVOKE.
To transfer ownership of an object, you must have:
v Object existence authority for the object
v *ALL authority or ownership, if the object is an authorization list
v Add authority for the new owners user profile
v Delete authority for the present owners user profile
You cannot delete a user profile that owns objects. The topic Deleting User
Profiles on page 109 shows methods for handling owned objects when deleting a
profile.
The Work with Objects by Owner display includes integrated file system objects.
For these objects, the Object column on the display shows the first 18 characters of
the path name. If the path name is longer than 18 characters, a greater than symbol
(>) appears at the end of the path name. To see the absolute path name, place your
cursor anywhere on the path name and press the F22 key.
152
153
custlst1
Files cleared at month-end
Additional Parameters
Authority . . . . . . . . . . .
*use
The AUT parameter sets the public authority for any objects secured by the list.
The public authority from the authorization list is used only when the public
authority for an object secured by the list is *AUTL.
CUSTLST1
QSYS
Owner . . . . . . . :
Primary group . . . :
PGMR1
*NONE
Object
List
Authority Mgt
*ALL
X
*USE
To give new users authority to the authorization list, press F6 (Add new users):
Each users authority to the list is actually stored as a private authority in that
Add New Users
Object . . . . . . . :
Library . . . . . :
CUSTLST1
QSYS
Owner . . . PGMR1
Object
List
Authority Mgt
*CHANGE
*CHANGE
users profile. You can also use commands to work with authorization list users,
either interactively or in batch:
154
ARWRK1
TESTLIB
*FILE
Owner . . . . . . . :
Primary group. . . . :
ASP device . . . . . :
PGMR1
*NONE
*SYSBAS
ARLST1
Object
Authority
*ALL
*AUTL
Set the public authority for the object to *AUTL if you want public authority to
come from the authorization list.
On the Edit Authorization List display, you can use F15 (Display authorization list
objects) to list all the objects secured by the list:
This is an information list only. You cannot add or remove objects from the list.
Display Authorization List Objects
Authorization list
Library . . . .
Owner . . . . . .
Primary group . .
Object
CUSTMAS
CUSTADDR
.
.
.
.
Library
CUSTLIB
CUSTLIB
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Type
*FILE
*FILE
.
.
.
.
.
.
.
.
:
:
:
:
CUSTLST1
CUSTLIB
OWNAR
DPTAR
Owner
OWNAR
OWNAR
Primary
group
Text
You can also use the Display Authorization List Objects (DSPAUTLOBJ) command
to view or print a list of all objects secured by the list.
155
156
157
|
|
Note: At any step in the authority checking process, the system may find sufficient
authority and authorize the user to the object.
158
|
|
|
1. The system checks the objects authority. (Refer to Flowchart 2: Fast Path for
Object Authority Checking.) If the system finds that authority is insufficient, it
proceeds to Step 2.
|
|
|
|
|
|
2. The system checks the users authority to the object. (Refer to Flowchart 3: How
User Authority to an Object Is Checked.) If the system determines that the user
does not have authority to the object, it proceeds to Step 3. If the system finds
that the users authority is insufficient, it proceed to Step 6.
3. The system checks whether the user profile belongs to any groups. If it does,
the system proceeds to Step 4. If it does not, the system proceed to Step 5.
|
|
|
|
4. The system determines the group authority. (Refer to Flowchart 6). If the
system determines that the group does not have authority to the object, it
proceeds to Step 5. If the system determines that the group does not have
sufficient authority to the object, it proceeds to Step 6.
|
|
|
|
5. The system checks the public authority of the object. (Refer to Flowchart 7.) If
the system determines that the public authority is insufficient, it proceeds to
Step 6.
6. The system checks the adopted authority of the object. (Refer to Flowchart 8.)
If the user is not authorized, one or more of the following happens:
v A message is sent to the user or program
v The program fails
v An AF entry is written to the audit journal
159
|
|
|
|
|
|
|
|
|
|
|
1. The system determines whether the object has any private authorities. If it
does, the system returns to calling flowchart with insufficient. If it does not, the
system proceeds to Step 2.
2. The system determines whether the object is secured by an authorization list. If
it is, the system returns to calling flowchart with insufficient. If it does not, the
system proceeds to Step 3.
3. The system determines whether the owner of the object has sufficient authority.
If it does, the system returns to calling flowchart with insufficient. If it does
not, the system proceeds to Step 4.
4. The system determines whether the object has a primary group. If it does, the
system proceeds to Step 5. If it does not the system proceeds to Step 6.
|
|
|
5. The system determines whether the objects primary group has sufficient
authority. If it does, the system proceeds to Step 6. If it does not, the system
returns to calling flowchart with insufficient.
160
|
|
|
6. The system determines whether public authority is sufficient. If it is, the object
is authorized. If it is not, the system returns to calling flowchart with
insufficient.
|
|
|
|
161
|
|
|
1. The system determines if the user profile has *ALLOBJ authority. If the profile
does have *ALLOBJ authority, then the profile is authorized. If it does not have
*ALLOBJ authority, then the authority checking proceeds to Step 2.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. The system sets the authority of the object to the equal the original object. The
authority checking proceeds to Step 3.
3. The system check the owner authority. If the authority is unsufficient, then it
proceeds to Step 8. If no authority is found, then it proceeds to Step 4.
4. The system completes a fast path authority check of the original object. (Refer
to Flowchart 5). If authority is insufficient, then authority checking proceeds to
Step 5.
5. The system determines if the object has private authorities. If it does, then the
authority check proceeds to Step 6. If there are no private authorities, then the
authority checking goes to Step 7.
6. The system check for private authorities with the user profile. If the authority is
sufficient, then the user is authorized. If authority is not sufficient, then the
authority checking proceeds to Step 8. If no authority is found, then the
authority checking proceeds to Step 7.
7. The system determines if the object is secured by an authorization list. If it is
not, then the authority checking proceeds to Step 8. If it is secured by an
authorization list, then the authority checking proceeds to Step 9.
8. The system sets the object to test equal to the original object and returns to the
calling flowchart with insufficient authority or no authority found.
9. The system sets the object to test equal to the authorization list and returns to
Step 3.
162
|
|
|
|
|
|
|
|
|
|
|
|
|
|
163
164
OWNAR
DPTMG
WILSONJ
*PUBLIC
X
X
X
X
X
X
X
2. This path provides a method for using public authority, if possible, even
though private authority exists for an object. The system tests to make sure that
nothing later in the authority checking process might deny access to the object.
If the result of these tests is Sufficient, searching private authorities can be
avoided.
Description of Flowchart 5: Fast Path for User Authority
This flowchart shows the fast path for testing user authority without searching
private authorities.
1. The system determines if there are any private authorities to the object being
checked. If there are private authorities to the object then the authority check
proceeds to Step 2. If there is no private authority, the authority check proceeds
to Step 3.
2. If private authorities exist, then the system determines if the object has private
authorities that are less than its public authority. (See note 1.) If the object does
have private authorities that are less than its public authority, then the system
returns to the calling flowchart with no authority or insufficient authority
found. If the object does not have private authorities that are less than its
public authority, (See note 2), then the authority check proceeds to Step 3.
3. If the object does not have private authorities that are less than its public
authority, then the system determine if the public authority is sufficient. If the
public authority is sufficient, then the authority check proceeds to Step 4. If the
public authority is insufficient, then system returns to the calling flowchart
with no authority or insufficient authority found.
4. If the public authority is sufficient, then the system determines if the object
owners authority is sufficient. If the object owners authority is sufficient, then
the authority check proceeds to Step 5. If the object owners authority is
insufficient, then system returns to the calling flowchart with no authority or
insufficient authority found.
5. If the object owners authority is sufficient, then the system determines if the
objects primary group authority is sufficient. If the objects primary group
authority is sufficient, then the authority check proceeds to Step 6. If objects
primary group authority is insufficient, then the system returns to the calling
flowchart with no authority or insufficient authority found.
Chapter 5. Resource Security
165
6. If the objects primary group authority is sufficient, then the system determines
if the object is secured by an authorization list. If the object is secured by an
authorization list, then the system returns to the calling flowchart with no
authority or insufficient authority found. If the object is not secured by an
authorization list, then the user is authorized to the object.
OWNAR
DPT506
DPT702
X
X
X
X
X
X
X
X
X
X
X
X
X
*PUBLIC
X
X
X
X
WAGNERB needs both DPT506 and DPT702 to get sufficient authority to the
CRLIM file. DPT506 is missing *DLT authority, and DPT702 is missing *ADD
authority.
Flowchart 6 on page 167 shows the steps in checking group authority.
166
Note: If the user is signed on as the profile that is the primary group for an object,
the user cannot receive authority to the object through the primary group.
|
|
|
|
|
|
|
167
authority is not sufficient, then the authority check goes to Step 7. If the
authority is not found, then the authority check proceeds to Step 4.
4. If the owner authority is not found, then the system checks if the group is the
objects primary group.
|
|
|
|
Note: If the user is signed on as the profile that is the primary group for an
object, the user cannot receive authority to the object through the
primary group.
If the group is the objects primary group, then the authority check proceeds
to Step 5. If the group is not the objects primary group, then authority check
proceeds to Step 6.
|
|
|
|
|
|
|
|
|
|
5. If the group is the objects primary group, then the system checks and tests
the primary group authority. If primary group authority is sufficient, then the
group is authorized. If primary group authority is insufficient or is not found,
then the authority check goes to Step 7.
|
|
|
|
|
|
|
|
|
|
|
|
6. If the group is not the objects primary group, then the system looks up the
private authorities in the group profile. If authority is found then authority
checking goes to Step 10. If authority is not found then authority checking
proceeds to Step 7.
7. If no authority is found for the private authorities for the group profile then
the system checks to see if the object is secured by an authorization list. If the
object is secured by an authorization list, then the authority check proceeds to
Step 8. If the object is not secured by an authorization list then the authority
check goes to Step 11.
8. If the object is secured by an authorization list, then the system set the object
to be checked equal to the authorization list and authority check returns to
Step 3.
|
|
|
9.
If the user does belong to another group profile, then the system sets this
profile to the next group profile and returns to Step 1 to start the authority
checking process over again.
|
|
|
|
10. If authority is found for private authorities within the group profile, then the
private authorities are checked and tested in the group profile. If authorities
are sufficient, then the group profile is authorized. If it is not sufficient then
the authority check goes to Step 7.
|
|
|
|
|
11. If an object is not secured by an authorization list, then the system checks to
see if the users is associated with another group profile. If the user does
belong to another group profile, then the system goes to Step 9. If the user
does not belong to another group profile then the system returns to the calling
flowchart with insufficient authority or no authority found.
168
|
|
Flowchart 7 shows how the system must determine whether to use the public
authority for the object or the authorization list.
|
|
|
|
|
|
1. The system determine if the public authority for the original object is *AUTL. If
the public authority for the original object is *AUTL, then the system proceeds
to Step 2. If the public authority for the original object is not *AUTL, then the
system proceeds to Step 3.
2. If the public authority for the original object is *AUTL, then the system sets the
object being checked equal to the authorization list and proceeds to Step 4.
|
|
3. If the public authority for the original object is not *AUTL, then the system sets
the object being checked to the original object and proceeds to Step 4.
|
|
|
|
|
4. If the object being checked has been set equal to the authorization list or the
original object, the system determines of the public authority is sufficient. If the
public authority is sufficient then user is authorized to the object. If the public
authority is not sufficient then the system returns to the calling flowchart with
insufficient authority.
169
Figure 20 and Figure 21 on page 172 show the process for checking adopted
authority.
Figure 20. Flowchart 8A: Checking Adopted Authority User *ALLOBJ and Owner
|
|
|
|
|
|
|
|
|
|
Flowchart 8A describes how the system checks adopted authority when insufficient
authority has been found by checking user authority.
1. The system sets the object being checked to the original object and proceeds to
Step 2.
2. The system determines if the program adopts authority. If the program does
adopt authority then the authority checking proceeds to Step 3. If the program
does not adopt authority and the authority is insufficient, then authority
checking goes to Step 5.
170
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. If the program does adopt authority, then the system determines if the program
owner has *ALLOBJ authority. If the program owner does have *ALLOBJ
authority, then the user is authorized. If the program owner does not have
*ALLOBJ authority, then the authority checking proceeds to Step 4.
4. If the program owner does not have *ALLOBJ authority, then the system checks
and tests the owner authority. If the authority is sufficient, then the user is
authorized. If the authority is insufficient then authority checking proceeds to
Step 5.
5. The system checks USEADPAUT value for the program currently being test. If
the value equals *NO then authority checking proceeds to Step 8. If the value is
equal to *YES then the authority checking proceeds to Step 6.
6. If the USEADPAUT value is equal to *YES, then the system determine if there
are more programs waiting in the stack. If there are more programs in the
stack, then authority checking proceeds to Step 7. If there are not any more
programs waiting in the stack, then authority checking goes to Step 8.
7. If there are more programs in the stack, the system test the next program in
the stack.
|
|
|
|
|
8. If there are no more programs in the stack or the USEADPAUT value is equal
to *NO, then system sets the object and program to the original values and
proceeds to Step 9.
9. The system check private authority. This is described in Flowchart 8B:
Checking Adopted Authority Using Private Authorities.
171
Figure 21. Flowchart 8B: Checking Adopted Authority Using Private Authorities
|
|
|
|
|
|
172
|
|
|
|
|
|
|
|
|
|
|
|
3. The system checks the private and primary group authorities for the program
owner. If authority is sufficient, the program is authorized. If insufficient
authority is found, proceed to Step 7. If no authority is found, proceed to Step
4.
4. The system determines whether the object is secured by an authorization list.
If yes, proceed to Step 5. If no, proceed to Step 7.
5. The system sets object equal to authorization list and then proceeds to Step 6.
6. The system checks the owners authority to the authorization list. (Refer to
Flowchart 4.) If not authority is found, go back to Step 2. If sufficient
authority is found, the program is authorized.
7. The system tests the USEADPAUT authority value for the program currently
being checked. If *YES, proceed to Step 8. If *NO, access denied.
|
|
|
8. The system checks whether there are more programs in the stack. If yes,
proceed to Step 9. If no, access denied.
9. The system sets object equal to original object and proceeds to Step 10.
10. Text using next program in stack and start back at Step 1.
PRICES
CONTRACTS
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
Group
OWNCP
*NONE
*SYSBAS
*NONE
Object
Authority
*ALL
*CHANGE
*CHANGE
*USE
*USE
173
1. Flowchart 1, step 1.
a. Flowchart 2, step 1.
2. Flowchart 1, step 2.
a. Flowchart 3, steps 1 and 2. Object to check = CONTRACTS/PRICES *FILE.
b. Flowchart 3, step 3.
1) Flowchart 4, step 1. Return to Flowchart 3 with no authority found.
ROSSM does not own the PRICES file.
c. Flowchart 3, step 4.
1) Flowchart 5, steps 1, 2, and 3. Public is not sufficient.
d. Flowchart 3, step 5.
e. Flowchart 3, step 6. ROSSM does not have private authority to the PRICES
file.
f. Flowchart 3, steps 7 and 8. The PRICES file is not secured by an
authorization list. Return to Flowchart 1 with no authority found.
3. Flowchart 1, steps 3 and 4. DPTSM is the group profile for ROSSM.
a. Flowchart 6, steps 1, 2, and 3.
1) Flowchart 4, step 1. DPTSM does not own the PRICES file.
b. Flowchart 6, step 4. DPTSM is not the primary group for the PRICES file.
c. Flowchart 6, step 6. Authorized. (DPTSM has *CHANGE authority.)
Result: ROSSM is authorized because the group profile DPTSM has *CHANGE
authority.
Analysis: Using group authority in this example is a good method for managing
authorities. It reduces the number of private authorities on the system and is easy
to understand and audit. However, using private group authority usually causes
two searches of private authorities (for the user and the group), when public
authority is not adequate. One search of the private authority could have been
avoided by making DPTSM the primary group for the PRICES file.
|
|
|
|
|
|
|
|
|
|
|
|
|
||
Object . . . . . . . :
Library . . . . . :
Object type
. . . :
CREDIT
ACCTSRCV
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
|
|
Group
Object
Authority
*ALL
*CHANGE
*USE
174
OWNAR
DPTAR
*SYSBAS
*NONE
The system performs these steps to determine whether to allow ANDERSJ to have
*CHANGE access to the CREDIT file:
1. Flowchart 1, step 1.
a. Flowchart 2, step 1. DPTARs authority is primary group authority, not
private authority.
b. Flowchart 2, steps 2, 3, 4, 5, and 6. Public authority is not sufficient.
2. Flowchart 1, step 2.
a. Flowchart 3, steps 1 and 2. Object to check = ACCTSRCV/CREDIT *FILE.
b. Flowchart 3, step 3.
1) Flowchart 4, step 1. ANDERSJ does not own the CREDIT file. Return to
Flowchart 3 with no authority found.
c. Flowchart 3, step 4.
1) Flowchart 5, step 1. The CREDIT file has no private authorities.
2) Flowchart 5, step 3. Public authority is not sufficient. Return to
Flowchart 3 with no authority found.
d. Flowchart 3, steps 5, 7, and 8. The CREDIT file is not secured by an
authorization list. Return to Flowchart 1 with no authority found.
3. Flowchart 1, steps 3 and 4. ANDERSJ is a member of the DPTAR group profile.
a. Flowchart 6, steps 1 and 2. Object to check = ACCTSRCV/CREDIT *FILE.
b. Flowchart 6, step 3.
1) Flowchart 4, step 1. DPTAR does not own the CREDIT file. Return to
Flowchart 6 with no authority found.
c. Flowchart 6, steps 4 and 5. Authorized. DPTAR is the primary group for the
CREDIT file and has *CHANGE authority.
Result: ANDERSJ is authorized because DPTAR is the primary group for the
CREDIT file and has *CHANGE authority.
Analysis: If you use primary group authority, the authority checking performance
is better than if you specify private authority for the group. This example does not
require any search of private authorities.
175
profile DPTSM and does not have *ALLOBJ special authority. The system performs
these steps in determining whether to allow JONESP access to the PRICES file:
1. Flowchart 1, step 1.
a. Flowchart 2, step 1. The PRICES file has private authorities.
2. Flowchart 1, step 2.
a. Flowchart 3, steps 1 and 2. Object to check = CONTRACTS/PRICES *FILE.
b. Flowchart 3, step 3.
1) Flowchart 4, step 1. JONESP does not own the PRICES file. Return to
Flowchart 3 with no authority found.
c. Flowchart 3, step 4.
1) Flowchart 5, steps 1, 2, and 3. Public authority is sufficient.
2) Flowchart 5, step 4. Owner authority is sufficient. (OWNCP has *ALL.)
3) Flowchart 5, step 5. The PRICES file does not have a primary group.
4) Flowchart 5, step 6. Authorized. (The PRICES file is not secured by an
authorization list.)
Analysis: This example shows the performance benefit gained when you avoid
defining any private authorities for an object that are less than public authority.
Although private authority exists for the PRICES file, the public authority is
sufficient for this request and can be used without searching private authorities.
176
177
ITEM
ITEMLIB
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . :
|
|
Group
OWNIC
*NONE
*SYSBAS
*NONE
Object
Authority
*ALL
*USE
ROSSM needs *USE authority to the ITEM file. ROSSM is a member of the DPTSM
group profile. These are the authority-checking steps:
1. Flowchart 1, step 1.
a. Flowchart 2, steps 1, 2, and 3. OWNICs authority is sufficient.
b. Flowchart 2, step 4. The ITEM file does not have a primary group.
c. Flowchart 2, step 6. Authorized. Public authority is sufficient.
Analysis: Public authority provides the best performance when it is used without
any private authorities. In this example, private authorities are never searched.
178
1) Flowchart 4, step 1. WILSONJ does not own the ITEM file. Return to
Flowchart 3 with no authority found.
c. Flowchart 3, step 4.
1) Flowchart 5, steps 1 and 3. Public authority is not sufficient. Return to
Flowchart 3 with no authority found.
d. Flowchart 3, steps 5, 7, and 8. The ITEM file is not secured by an
authorization list. Return to Flowchart 1 with no authority found.
3. Flowchart 1, steps 3 and 5. (WILSONJ does not have a group profile.)
a. Flowchart 7, steps 1, 3, and 4. The public has *USE authority, which is not
sufficient.
4. Flowchart 1, step 6.
a. Flowchart 8A, step 1. Object to check = ITEMLIB/ITEM *FILE.
b. Flowchart 8A, steps 2, 3, and 4. The OWNIC profile does not have *ALLOBJ
authority.
1) Flowchart 4, steps 1, 2, and 3. Authorized. OWNIC has sufficient
authority to the ITEM file.
Analysis: This example shows the benefits of using adopted authority without
private authority, particularly if the owner of the programs also owns application
objects. This example did not require searching private authorities.
ARWRK01
CUSTLIB
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
Group
OWNAR
*NONE
*SYSBAS
ARLST1
Object
Authority
*ALL
*USE
179
Group
ARLST1
QSYS
Owner . . . . . . . :
Primary group . . . :
OWNAR
*NONE
Object
List
Authority Mgt
*ALL
*CHANGE
*USE
User AMESJ, who is not a member of a group profile, needs *CHANGE authority
to the ARWRK01 file. These are the authority-checking steps:
1. Flowchart 1, step 1.
a. Flowchart 2, steps 1 and 2. The ARWRK01 file is secured by an
authorization list.
2. Flowchart 1, step 2.
a. Flowchart 3, steps 1 and 2. Object to check = CUSTLIB/ARWRK01 *FILE.
b. Flowchart 3, step 3.
1) Flowchart 4, step 1. AMESJ does not own the ARWRK01 file. Return to
Flowchart 2 with no authority found.
c. Flowchart 3, step 4.
1) Flowchart 5, steps 1 and 3. Public authority is not sufficient. Return to
Flowchart 3 with no authority found.
d. Flowchart 3, steps 5, 7, and 9. Object to check = ARLST1 *AUTL.
e. Flowchart 3, step 3.
1) Flowchart 4, step 1. AMESJ does not own the ARLST1 authorization list.
Return to Flowchart 3 with no authority found.
f. Flowchart 3, steps 4 and 5.
g. Flowchart 3, step 6. Authorized. AMESJ has *CHANGE authority to the
ARLST1 authorization list.
Analysis: This example demonstrates that authorization lists can make authorities
easy to manage and provide good performance. This is particularly true if objects
secured by the authorization list do not have any private authorities.
If AMESJ were a member of a group profile, it would add additional steps to this
example, but it would not add an additional search of private authorities, as long
as no private authorities are defined for the ARWRK01 file. Performance problems
are most likely to occur when private authorities, authorization lists, and group
profiles are combined, as in Case 11: Combining Authorization Methods on
page 181.
180
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
|
|
CRLIM
CUSTLIB
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
Group
OWNAR
DPTAR
*SYSBAS
*NONE
Object
Authority
*ALL
*CHANGE
*USE
*EXCLUDE
181
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
||
CRLIMWRK
CUSTLIB
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
|
|
Group
OWNAR
*NONE
*SYSBAS
CRLST1
Object
Authority
*ALL
*USE
*EXCLUDE
*USE
The CRLIMWRK file is secured by the CRLST1 authorization list. Figure 29 shows
the authority for the CRLST1 authorization list.
Group
CRLST1
QSYS
Owner . . . . . . . :
Primary Group . . . :
OWNAR
DPTAR
Object
List
Authority Mgt
*ALL
X
*ALL
*EXCLUDE
This example shows many of the possibilities for authority checking. It also
demonstrates how using too many authority options for an object can result in
poor performance.
Following are the steps required to check WAGNERBs authority to the
CRLIMWRK file:
1. Flowchart 1, step 1.
a. Flowchart 2, step 1.
2. Flowchart 1, step 2.
a. Flowchart 3, steps 1 and 2. Object to check = CUSTLIB/CRLIMWRK
*FILE.
b. Flowchart 3, step 3.
1) Flowchart 4, step 1. WAGNERB does not own the CRLIMWRK file.
Return to Flowchart 3 with no authority found.
c. Flowchart 3, step 4.
1) Flowchart 5, steps 1 and 2. WILSONJ has *EXCLUDE authority, which
is less than the public authority of *USE.
182
183
s. Flowchart 6, step 3.
1) Flowchart 4, step 1. DPTAR does not own the CRLST1 authorization
list. Return to Flowchart 6 with no authority found.
t. Flowchart 6, steps 4 and 5. Authorized. DPTAR is the primary group for
the CRLST1 authorization list and has *ALL authority.
Result: WAGNERB is authorized to perform the requested operation using
DPTARs primary group authority to the CRLIST1 authorization list.
Analysis: This example demonstrates poor authority design, both from a
management and performance standpoint. Too many options are used, making it
difficult to understand, change, and audit. Private authorities are searched 6
separate times, which may cause noticeable performance problems:
Profile
Object
Type
Result
WAGNERB
WAGNERB
DPTSM
CRLIMWRK
CRLST1
CRLIMWRK
*FILE
*AUTL
*FILE
DPT702
DPT702
DPTAR
CRLIMWRK
CRLST1
CRLIMWRK
*FILE
*AUTL
*FILE
No authority found
No authority found
*USE authority
(insufficient)
No authority found
No authority found
No authority found
Authority Cache
In Version 3, Release 7, the system creates an authority cache for a user the first
time the user accesses an object. Each time the object is accessed, the system looks
for authority in the users cache before looking at the userss profile. This results in
a faster check for private authority.
The authority cache contains up to 32 private authorities to objects and up to 32
private authorities to authorization lists. The cache is updated when a user
authority is granted or revoked. All user caches are cleared when the system IPL is
performed.
While limited use of private authorities is recommended, the cache offers
flexibility. For example, you can choose how to secure objects with less concern
about the impact on system performance. This is especially true if users access the
same objects repeatedly.
184
Job Initiation
When you start a job on the system, objects are associated with the job, such as an
output queue, a job description, and the libraries on the library list. Authority for
some of these objects is checked before the job is allowed to start and for other
objects after the job starts. Inadequate authority may cause errors or may cause the
job to end.
Objects that are part of the job structure for a job may be specified in the job
description, the user profile, and on the Submit Job (SBMJOB) command for a
batch job.
185
Output queue
Current library
Libraries in library list
If any of these objects does not exist or the user does not have adequate
authority, a message is displayed at the bottom of the Sign On display, and the
user is unable to sign on. If authority is successfully verified for these objects,
the job is started on the system.
Note: Authority to the print device and job queue is not verified until the user
attempts to use them.
After the job is started, these steps are performed before the user sees the first
display or menu:
1. If the routing entry for the job specifies a user program, normal authority
checking is done for the program, the program library, and any objects used by
the program. If authority is not adequate, a message is sent to the user on the
Sign On display and the job ends.
2. If the routing entry specifies the command processor (QCMD):
a. Authority checking is done for the QCMD processor program, the program
library, and any objects used, as described in step 1.
b. The users authority to the Attention-key-handling program and library is
checked. If authority is not adequate, a message is sent to the user and
written to the job log. Processing continues.
If authority is adequate, the Attention-key-handling program is activated.
The program is not started until the first time the user presses the Attention
key. At that time, normal authority checking is done for the objects used by
the program.
c. Normal authority checking is done for the initial program (and its
associated objects) specified in the user profile. If authority is adequate, the
program is started. If authority is not adequate, a message is sent to the
user and written to the job log. The job ends.
d. Normal authority checking is done for the initial menu (and its associated
objects) specified in the user profile. If authority is adequate, the menu is
displayed. If authority is not adequate, a message is sent to the user and
written to the job log. The job ends.
186
Workstations
A device description contains information about a particular device or logical unit
that is attached to the system. When you sign on the system, your workstation is
attached to either a physical or virtual device description. To successfully sign on,
you must have *CHANGE authority to the device description.
The QLMTSECOFR (limit security officer) system value controls whether users
with *ALLOBJ or *SERVICE special authority must be specifically authorized to
device descriptions.
Figure 30 on page 188 shows the logic for determining whether a user is allowed to
sign on at a device:
187
Note: Normal authority checking is performed to determine whether the user has
at least *CHANGE authority to the device description. *CHANGE authority
may be found by using the following:
v *ALLOBJ special authority from the user profile, group profile, or
supplemental group profiles.
v Private authority to the device description in the user profile, the group
profile, or supplemental group profiles.
v Authority to an authorization list used to secure the device description.
v Authority to an authorization list used to secure the public authority.
188
Authority checking for the device description is done before any programs
are in the program stack for the job; therefore, adopted authority does not
apply.
|
|
|
|
|
The system determines the users authority to the workstation. (See note 1) If the
authority is less than *CHANGE then the sign-on fails. If the authority is
*CHANGE or greater than the system check to see it the security level on the
system is 30 or higher. If it is not, then the user is allowed to sign-on.
|
|
|
If the security level is 30 or higher, the system checks if the user has *ALLOBJ or
*SERVICE special authorities. If the user does not have either of these special
authorities, then sign-on is allowed.
|
|
|
If the user has either *ALLOBJ or *SERVICE special authorities, then the system
checks if the QLMTSECOFR system value is set to 1. If it is not set to 1, then
sign-on is allowed.
|
|
|
|
|
If the QLMTSECOFR system value is set to 1, then the system will test the users
authority to the workstation. If the users authority is *CHANGE or higher, then
sign-on is allowed. If the users authority is less than *CHANGE, sign-on fails. If
the user has no authority to the workstation, the system checks the users group
authority to the workstation.
|
|
|
|
If the users group authority is *CHANGE or higher, then sign-on is allowed. If the
users group authority is less than *CHANGE, sign-on fails. If the user has no
authority to the workstation, the system checks whether or not the user has
*SERVICE but not *ALLOBJ special authority.
|
|
|
If the user has *SERVICE but not *ALLOBJ special authority, then sign-on fails. If
the user does have *SERVICE but not *ALLOBJ special authority, then the system
checks if QSECOFR has *CHANGE or higher.
|
|
189
190
programs when the interactive job is started. You can change the UBUFFER
field to contain as many smaller fields as you need if the following
requirements are met:
v The new fields must follow all other fields in the display file. The location of
the fields on the display does not matter as long as the order in which they
are put in the data description specifications (DDS) meets this requirement.
v The length must total 128. If the length of the fields is more than 128, some
of the data will not be passed.
v All fields must be input/output fields (type B in DDS source) or hidden
fields (type H in DDS source).
2. The order in which the fields in the signon display file are declared must not
be changed. The position in which they are shown on the display can be
changed. Do not change the existing field names in the source for the signon
screen display file.
3. Do not change the total size of the input or output buffers. Serious problems
can occur if the order or size of the buffers are changed.
4. Do not use the data descriptions specifications (DDS) help function in the
signon display file.
5. Change a subsystem description to use the changed display file instead of the
system default of QSYS/QDSIGNON. You can change the subsystem
descriptions for subsystems that you want to use the new display. To change
the subsystem description:
a. Use the Change Subsystem Description (CHGSBSD) command.
b. Specify the new display file on the SGNDSPF parameter.
c. Use a test version of a subsystem to verify that the display is valid before
attempting to change the controlling subsystem.
6. Test the change.
7. Change the other subsystem descriptions.
Notes:
1. The buffer length for the display file must be 318. If it is less than 318, the
subsystem uses the default sign-on display, QDSIGNON in library QSYS when
system value QPWDLVL is 0 or 1 and QDSIGNON2 in library QSYS when
QPWDLVL is 2 or 3.
2. The copyright line cannot be deleted.
Subsystem Descriptions
Subsystem descriptions control:
How jobs enter your system
How jobs are started
Performance characteristics of jobs
Only a few users should be authorized to change subsystem descriptions, and
changes should be carefully monitored.
191
Job Descriptions
A job description is a valuable tool for security and work management. You can
also set up a job description for a group of users who need the same initial library
list, output queue, and job queue. You can set up a job description for a group of
batch jobs that have similar requirements.
A job description also represents a potential security exposure. In some cases, a job
description that specifies a profile name for the USER parameter can allow a job to
enter the system without appropriate security checking. Controlling How Jobs
Enter the System on page 191 discusses how this can be prevented for interactive
and communications jobs.
When a batch job is submitted, the job might run using a different profile other
than the user who submitted the job. The profile can be specified on the SBMJOB
command, or it can come from the USER parameter of the job description. If your
system is at security level (QSECURITY system value) 30 or lower, the user
submitting a job needs authority to the job description but not to the user profile
specified on the job description. This represents a security exposure. At security
level 40 and higher, the submitter needs authority to both the job description and
the user profile.
For example:
v USERA is not authorized to file PAYROLL.
v USERB has *USE authority to the PAYROLL file and to program PRLIST, which
lists the PAYROLL file.
192
You can prevent this by using security level 40 and higher or by controlling the
authority to job descriptions that specify a user profile.
|
|
|
|
Sometimes, a specific user profile name in a job description is required for certain
types of batch work to function properly. For example, the QBATCH job
description is shipped with USER(QPGMR). This job description is shipped with
the public authority of *EXCLUDE.
|
|
|
|
|
|
If your system is at security level 30 or lower, any user on the system who has
authority to the Submit Job (SBMJOB) command or the start reader commands,
and has *USE authority to the QBATCH job description, can submit work under
the programmer (QPGMR) user profile, whether or not the user has authority to
the QPGMR profile. At security level 40 and higher, *USE authority to the QPGMR
profile is also required.
Library Lists
The library list for a job indicates which libraries are to be searched and the order
in which they are to be searched. When a program specifies an object, the object
can be specified with a qualified name, which includes both the object name and
the library name. Or, the library for the object can be specified as *LIBL (library
list). The libraries on the library list are searched, in order, until the object is found.
Table 108 on page 194 summarizes the parts of the library list and how they are
built during a job. The sections that follow discuss the risks and protection
measures for library lists.
193
Table 108. Parts of the Library List. The library list is searched in this sequence:
Part
How It Is Built
System Portion 15 Initially built using the QSYSLIBL system value. Can be changed during
entries
a job with the CHGSYSLIBL command.
Product Library
Portion 2 entries
Current Library 1 Specified in the user profile or on the Sign On display. Can be changed
entry
when a command or menu runs that specifies a library for the CURLIB
parameter. Can be changed during the job with the CHGCURLIB
command.
User Portion 250
entries
Initially built using the initial library list from the users job description.
If the job description specifies *SYSVAL, the QUSRLIBL system value is
used. During a job, the user portion of the library list can be changed
with the ADDLIBLE, RMVLIBLE, CHGLIBL, and EDTLIBL commands.
Change in Function
Figure 31 shows an application library. Program A calls Program B, which is
expected to be in LIBA. Program B performs updates to File A. Program B is called
without a qualified name, so the library list is searched until Program B is found.
194
195
As long as CMDX is running, LIBB is in the product portion of the library list.
Use these measures to protect the product portion of the library list:
v Control authority to the Create Command (CRTCMD), Change Command
(CHGCMD), Create Menu (CRTMNU), and Change Menu (CHGMNU)
commands.
v When you create commands and menus, specify PRDLIB(*NONE), which
removes any entries currently in the product portion of the library list. This
protects you from having unknown libraries searched ahead of the library you
expect when your command or menu runs.
Note: The default when you create a command or menu is PRDLIB(*NOCHG).
*NOCHG means that when the command or menu is run, the product
library portion of the library list is not changed.
196
v Use the Add Library List Entry (ADDLIBLE) command at the beginning of the
program to ensure the desired objects are at the beginning of the user portion of
the library list. At the end of the program, the library can be removed.
If the library is already on the library list, but you are not sure if it is at the
beginning of the list, you must remove the library and add it. If the sequence of
the library list is important to other applications on the system, use the next
method instead.
v Use a program that retrieves and saves the library list for a job. Replace the
library list with the list desired for the application. When the application ends,
return the library list to its original setting. See Controlling the User Library
List on page 215 for an example of this technique.
Printing
Most information that is printed on your system is stored as a spooled file on an
output queue while it is waiting to print. Unless you control the security of output
queues on your system, unauthorized users can display, print, and even copy
confidential information that is waiting to print.
One method for protecting confidential output is to create a special output queue.
Send confidential output to the output queue and control who can view and
manipulate the spooled files on the output queue.
To determine where output goes, the system looks at the printer file, job attributes,
user profile, workstation device description, and the print device (QPRTDEV)
system value in sequence. If defaults are used, the output queue associated with
the QPRTDEV printer is used. The Printer Device Programming book provides
examples of how to direct output to a particular output queue.
197
*YES
*OWNER
Only the user who owns the output queue can change or delete
spooled files owned by others.
*DTAAUT
Specifies that any user with *READ, *ADD, and *DLT authority
to the output queue can change or delete spooled files owned
by others.
198
*YES
*NO
*JOBCTL special authority does not give the user any authority
to perform operations on the output queue. Normal authority
rules apply to the user.
DSPDTA
AUTCHK
OPRCTL
Output
Queue
Authority
*READ
*YES
View list of spooled files
(WRKOUTQ command 2)
Display, copy, or send spooled files
(DSPSPLF, CPYSPLF, SNDNETSPLF, SNDTCPSP2)
*READ
*YES
*YES
*NO
*NO
*YES
*NO
*OWNER
Change, delete, hold, and release spooled file
(CHGSPLFA, DLTSPLF, HLDSPLF, RLSSPLF 2)
*READ
*READ,
*ADD,
*DLT
Owner 3
*DTAAUT
*OWNER
*YES
*YES
*DTAAUT
*READ,
*ADD,
*DLT
Owner 3
*OWNER
*YES
Change, clear, hold, and release output queue
(CHGOUTQ, CLROUTQ, HLDOUTQ, RLSOUTQ 2)
*DTAAUT
*READ,
*ADD,
*DLT
Owner 3
*OWNER
*YES
Start a writer for the queue
(STRPRTWTR, STRRMTWTR 2)
*DTAAUT
*CHANGE
*YES
Special
Authority
None
*JOBCTL
None
*JOBCTL
None
None
None
*JOBCTL
*JOBCTL
None
None
*JOBCTL
None
None
*JOBCTL
None
*JOBCTL
*CHGOUTQ requires *OBJMGT authority to the output queue, in addition to *READ, *ADD, and *DLT
authorities.
199
v Create an output queue for an application. Only members of the group profile
GRPA are allowed to use the output queue. All authorized users of the output
queue are allowed to display all spooled files. System operators are not allowed
to work with the output queue:
CRTOUTQ OUTQ(ARLIB/AROUTQ) DSPDTA(*YES) +
OPRCTL(*NO) AUTCHK(*OWNER) AUT(*EXCLUDE)
GRTOBJAUT OBJ(ARLIB/AROUTQ) OBJTYP(*OUTQ) +
USER(GRPA) AUT(*CHANGE)
v Create a confidential output queue for the security officers to use when printing
information about user profiles and authorities. The output queue is created and
owned by the QSECOFR profile.
CRTOUTQ OUTQ(QGPL/SECOUTQ) DSPDTA(*OWNER) +
AUTCHK(*DTAAUT) OPRCTL(*NO) +
AUT(*EXCLUDE)
Even if the security officers on a system have *ALLOBJ special authority, they
are not able to access spooled files owned by others on the SECOUTQ output
queue.
v Create an output queue that is shared by users printing confidential files and
documents. Users can work with only their own spooled files. System operators
can work with the spooled files, but they cannot display the contents of the files.
CRTOUTQ OUTQ(QGPL/CFOUTQ) DSPDTA(*OWNER) +
AUTCHK(*OWNER) OPRCTL(*YES) AUT(*USE)
Network Attributes
Network attributes control how your system communicates with other systems.
Some network attributes control how remote requests to process jobs and access
information are handled. These network attributes directly affect security on your
system and are discussed in the topics that follow:
Job action (JOBACN)
Client request access (PCSACC)
DDM request access (DDMACC)
Possible values for each network attribute are shown. The default value is
underlined. To set the value of a network attribute, use the Change Network
Attribute (CHGNETA) command.
200
*FILE
*SEARCH
Recommendations
If you do not expect to receive remote job requests on your system, set the
JOBACN network attribute to *REJECT.
For more information about the JOBACN attribute, refer to the SNA Distribution
Services book.
*OBJAUT
*REGFAC
201
the iSeries Access program and a program on the personal computer to transfer
that entire file to the personal computer. The user can then copy the data to a PC
diskette or tape and remove it from the premises.
Several methods are available to prevent an iSeries workstation user with *USE
authority to a file from copying the file:
v
v
v
v
*OBJAUT
qualified- program- name
The system does not allow any DDM or DRDA requests from
remote systems. *REJECT does not prevent this system from
functioning as the requester system and sending requests to
other server systems.
Remote requests are controlled by the object authority on the
system.
This user-written exit program is called after normal object
authority has been verified. The exit program is called only for
DDM files, not for distributed relational database functions.
The exit program is passed a parameter list, built by the remote
system, that identifies the local system user and the request.
The program evaluates the request and sends a return code,
granting or denying the requested access.
For more information about the DDMACC network attribute and the security
issues associated with DDM, see the Information Center (see Prerequisite and
related information on page xvi for details).
202
2. To use the authorization list to secure the save commands, type the following:
GRTOBJAUT OBJ(SAV*) OBJTYPE(*CMD) AUTL(SRLIST)
3. To ensure *PUBLIC authority comes from the authorization list, type the
following:
GRTOBJAUT OBJ(SAV*) OBJTYPE(*CMD) USER(*PUBLIC)
AUT(*AUTL)
4. To use the authorization list to secure the restore commands, type the
following:
GRTOBJAUT OBJ(RST*) OBJTYPE(*CMD) AUTL(SRLIST)
5. To ensure *PUBLIC authority comes from the authorization list, type the
following:
Chapter 6. Work Management Security
203
6. Although system operators who are responsible for saving the system have
*SAVSYS special authority, they must now be given explicit authority to the
SAVxxx commands. You do this by adding the system operators to the
authorization list:
ADDAUTLE AUTL(SRLIST) USER(USERA USERB) AUT(*USE)
Note: You may want your system operators to have authority only to the save
commands. In that case, secure the save commands and the restore
commands with two separate authorization lists.
7. To restrict the save and restore APIs and secure it with the authorization list,
type the following commands:
GRTOBJAUT OBJ(QSRSAVO) OBJTYPE(*PGM) AUTL(SRLIST)
GRTOBJAUT OBJ(QSRSAVO) OBJTYPE(*PGM) USER(*PUBLIC)
AUT(*AUTL)
GRTOBJAUT OBJ(QSRLIB01) OBJTYPE(*SRVPGM) AUTL(SRLIST)
GRTOBJAUT OBJ(QSRLIB01) OBJTYPE(*SRVPGM) USER(*PUBLIC)
AUT(*AUTL)
Performance Tuning
Monitoring and tuning performance is not the responsibility of a security officer.
However, the security officer should ensure that users are not altering the
performance characteristics of the system to speed up their own jobs at the
expense of others.
Several work management objects affect the performance of jobs in the system:
v The class sets the run priority and time slice for a job.
v The routing entry in the subsystem description determines the class and the
storage pool the job uses.
v The job description can determine the output queue, output priority, job queue,
and job priority.
Knowledgeable users with appropriate authority can create their own environment
on the system and give themselves better performance than other users. Control
this by limiting the authority to create and change work management objects. Set
the public authority to work management commands to *EXCLUDE and grant
authority to a few trusted users.
Performance characteristics of the system can also be changed interactively. For
example, the Work with System Status (WRKSYSSTS) display can be used to
change the size of storage pools and the activity levels. Also, a user with *JOBCTL
(job control) special authority can change the scheduling priority of any job on the
system, subject to the priority limit (PTYLMT) in the users profile. Assign
*JOBCTL special authority and PTYLMT in user profiles carefully.
To allow users to view performance information using the WRKSYSSTS command
but not change it, do the following:
GRTOBJAUT OBJ(CHGSHRPOOL) OBJTYPE(*CMD) +
USER(*PUBLIC)
AUT(*EXCLUDE)
204
To restrict compiles to batch, do the following for the create command for each
program type:
CHGCMD CMD(CRTxxxPGM) ALLOW(*BATCH *BPGM)
205
206
207
Description of graphic
|
|
|
|
|
|
|
|
This graphic shows how how five sets of user groups access applications and
libraries on the system at JKL Toy Company. The user groups include Warehouse,
Manufacturing, Sales and Marketing, Order Processing, and Accounting. The
Warehouse, Manufacturing and Sales and Marketing user groups all can access the
Inventory Control applications. The Sales and Marketing user group also has
access to the Contracts and Pricing application and the Customer Order
application. The Order Processing user group also can access the Customer Order
application. The Accounting user group uses the Accounts Receivable application.
Overall Recommendations
The recommendations in this chapter and in the Basic System Security and
Planning topic in the Information Center rely on one important principle:
simplicity. Keeping your security design as simple as possible makes it easier to
manage and audit security. It also improves application performance and backup
performance.
Following is a list of general recommendations for security design:
v Use resource security along with the methods available, such as limited
capabilities in the user profile and restricting users to a set of menus, to protect
information.
208
v
v
Attention: It is not sufficient to use only limited capabilities in the user profile
and menu access control to secure your system if you use a product
such as Client Access/400 or have communication lines attached to
your system. You must use resource security to secure those objects
you do not want accessible through these interfaces.
Secure only those objects that really require security. Analyze a library to
determine which objects, such as data files, are confidential and secure those
objects. Use public authority for other objects, such as data areas and message
queues.
Move from the general to the specific:
Plan security for libraries. Deal with individual objects only when necessary.
Plan public authority first, followed by group authority and individual
authority.
Make the public authority for new objects in a library (CRTAUT parameter) the
same as the public authority for the majority of existing objects in the library.
To make auditing easier and improve authority-checking performance, avoid
defining private authority that is less than the public authority for an object.
v Use authorization lists to group objects with the same security requirements.
Authorization lists are simpler to manage than individual authorities and help to
recover security information.
209
210
and the user signs on through a product that sends clear text passwords, then the
system validates the user against the password level 0 password and creates two
password level 2 passwords (as described above) for the user profile. Subsequent
sign ons will be validated against the password level 2 passwords.
Any client/service which uses password substitution will not work correctly at
QPWDLVL 2 if the client/service hasnt been updated to use the new password
(passphrase) substitution scheme. The administrator should check whether a
client/service which hasnt been updated to the new password substitution scheme
is required.
The clients/services that use password substitution include:
v TELNET
v iSeries Access
v iSeries Host Servers
v QFileSrv.400
v iSeries NetServer Print support
v DDM
v DRDA
v SNA LU6.2
It is highly recommended that the security data be saved prior to changing to
QPWDLVL 2. This can help make the transition back to QPWDLVL 0 or 1 easier if
that becomes necessary.
It is recommended that the other password system values, such as QPWDMINLEN
and QPWDMAXLEN not be changed until after some testing at QPWDLVL 2 has
occurred. This will make it easier to transition back to QPWDLVL 1 or 0 if
necessary. However, the QPWDVLDPGM system value must specify either
*REGFAC or *NONE before the system will allow QPWDLVL to be changed to 2.
Therefore, if you use a password validation program, you may wish to write a new
one that can be registered for the QIBM_QSY_VLD_PASSWRD exit point by using
the ADDEXITPGM command.
NetServer passwords are still supported at QPWDLVL 2, so any function/service
that requires a NetServer password should still function correctly.
Once the administrator is comfortable with running the system at QPWDLVL 2,
they can begin to change the password system values to exploit longer passwords.
However, the administrator needs to be aware that longer passwords will have
these effects:
v If passwords greater than 10 characters are specified, the password level 0 and 1
password is cleared. This user profile would not be able to signon if the system
is returned to password level 0 or 1.
v If passwords contain special characters or do not follow the composition rules
for simple object names (excluding case sensitivity), the password level 0 and 1
password is cleared.
v If passwords greater than 14 characters are specified, the NetServer password for
the user profile is cleared.
v The password system values only apply to the new password level 2 value and
do not apply to the system generated password level 0 and 1 password or
NetServer password values (if generated).
211
212
For example, changing the password to a value of RainyDay would result in the
system generating a password level 0 and 1 password of RAINYDAY. But
changing the the password value to Rainy Days In April would cause the system
to clear the password level 0 and 1 password (because the password is too long
and it contains blanks).
No message or indication is produced if the password level 0 or 1 password
could not be created.
v Sign on to the system through a mechanism that presents the password in clear
text (does not use password substitution). If the password is valid and the user
profile does not have a password that is usable at password levels 0 and 1, the
system creates an equivalent uppercase password that is usable at password
levels 0 and 1. The system is only able to create the password level 0 and 1
password if the conditions listed above are met.
The administrator can then change QPWDLVL to 1. All NetServer passwords are
cleared when the change to QPWDLVL 1 takes effect (next IPL).
Planning Libraries
Many factors affect how you choose to group your application information into
libraries and manage libraries. This topic addresses some of the security issues
associated with library design.
To access an object, you need authority to the object itself and to the library
containing the object. You can restrict access to an object by restricting the object
itself, the library containing the object, or both.
A library is like a directory used to locate the objects in the library. *USE authority
to a library allows you to use the directory to find objects in the library. The
authority for the object itself determines how you can use the object. *USE
authority to a library is sufficient to perform most operations on the objects in the
library. See Library Security on page 123 for more information about the
relationship between library and object authority.
Using public authority for objects and restricting access to libraries can be a
simple, effective security technique. Putting programs in a separate library from
other application objects can also simplify security planning. This is particularly
true if files are shared by more than one application. You can use authority to the
libraries containing application programs to control who can perform application
functions.
213
Following are two examples of using library security for the JKL Toy Company
applications. (See Figure 33 on page 208 for a diagram of the applications.)
v The information in the CONTRACTS library is considered confidential. The
public authority for all the objects in the library is sufficient to perform the
functions of the Pricing and Contracts application (usually *CHANGE). The
public authority to the CONTRACTS library itself is *EXCLUDE. Only users or
groups authorized to the Contracts and Pricing application are granted *USE
authority to the library.
v The JKL Toy Company is a small company with a nonrestrictive approach to
security, except for the contract and pricing information. All system users are
allowed to view customer and inventory information, although only authorized
users can change it. The CUSTLIB and the ITEMLIB libraries, and the objects in
the libraries, have public authority of *USE. Users can view information in these
libraries through their primary application or by using Query. The program
libraries have public authority *EXCLUDE. Only users who are allowed to
change inventory information have access to the ICPGMLIB. Programs that
change inventory information adopt the authority of the application owner
(OWNIC) and thus have *ALL authority to the files in the ITEMLIB library.
Library security is effective only if these rules are followed:
v Libraries contain objects with similar security requirements.
v Users are not allowed to add new objects to restricted libraries. Changes to
programs in the libraries are controlled. That is, application libraries should have
public authority of *USE or *EXCLUDE unless users need to create objects
directly into the library.
v Library lists are controlled.
214
user granted authority to the authorization list rather than an authorized object
entry for every object multiplied by the number of users that are granted the
private authority.
Library Lists
The library list for a job provides flexibility. It also represents a security exposure.
This exposure is particularly important if you use public authority for objects and
rely on library security as your primary means of protecting information. In this
case, a user who gains access to a library has uncontrolled access to the
information in the library. The topic Library Lists on page 193 provides a
discussion of security issues associated with library lists.
To avoid the security risks of library lists, your applications can specify qualified
names. When both the object name and the library are specified, the system does
not search the library list. This prevents a potential intruder from using the library
list to circumvent security.
However, other application design requirements may prevent you from using
qualified names. If your applications rely on library lists, the technique described
in the next section can reduce the security exposure.
215
Notes:
1. Regardless of how the program ends (normally or abnormally), the library list
is returned to the version it held when the program was called, because error
handling includes restoring the library list.
2. Because the CHGLIBL command requires a list of library names, it cannot be
run directly. The RTVJOBA command, therefore, retrieves the libraries used to
build the CHGLIBL command as a variable. The variable is passed as a
parameter to the QCMDEXC function.
3. If you exit to an uncontrolled function (for example, a user program, a menu
that allows commands to be entered, or the Command Entry display) in the
middle of a program, your program should replace the library list on return, to
ensure adequate control.
216
*EXCLUDE
*CHANGE
*CHANGE
This requires
Planning Menus
Menus are a good method for providing controlled access on your system. You can
use menus to restrict a user to a set of strictly controlled functions by specifying
limited capabilities and an initial menu in the user profile.
To use menus as an access control tool, follow these guidelines when designing
them:
v Do not provide a command line on menus designed for restricted users.
v Avoid having functions with different security requirements on the same menu.
For example, if some application users are allowed to only view information, not
change it, provide a menu that has only display and print options for those
users.
v Make sure the set of menus provides all the necessary links between menus so
the user does not need a command line to request one.
v Provide access to a few system functions, such as viewing printer output. The
ASSIST system menu gives this capability and can be defined in the user profile
as the Attention-key-handling program. If the user profile has a class of *USER
and has limited capabilities, the user cannot view the output or jobs of other
users.
v Provide access to decision-support tools from menus. The topic Using Adopted
Authority in Menu Design on page 218 gives an example of how to do this.
v Consider controlling access to the System Request Menu or some of the options
on this menu. See System Request Menu on page 222 for more information.
v For users who are allowed to run only a single function, avoid menus entirely
and specify an initial program in the user profile. Specify *SIGNOFF as the
initial menu.
At the JKL Toy Company, all users see an inquiry menu allowing access to most
files. For users who are not allowed to change information, this is the initial menu.
The return option on the menu signs the user off. For other users, this menu is
called by an inquiry option from application menus. By pressing F12 (Return), the
Chapter 7. Designing Security
217
user returns to the calling menu. Because library security is used for program
libraries, this menu and the programs it calls are kept in the QGPL library:
INQMENU
Inquiry Menu
1.
2.
3.
4.
5.
Item Descriptions
Item Balances
Customer Information
Query
Office
Initial Menu
1.
2.
3.
4.
Inventory Control
Customer Orders
Query
Office
(ICSTART)
(COSTART)
(QRYSTART)
(OFCSTART)
The programs that start applications (ICSTART and COSTART) adopt the authority
of a profile that owns the application objects. The programs add application
libraries to the library list and display the initial application menu. Following is an
example of the Inventory Control program (ICSTART).
218
PGM
ADDLIBLE ITEMLIB
ADDLIBLE ICPGMLIB
GO ICMENU
RMVLIBLE ITEMLIB
RMVLIBLE ICPGMLIB
ENDPGM
Figure 38. Sample Initial Application Program
The program that starts Query (QRYSTART) adopts the authority of a profile
(QRYUSR) provided to allow access to files for queries. Figure 39 shows the
QRYSTART program:
PGM
ADDLIBLE
ADDLIBLE
STRQRY
RMVLIBLE
RMVLIBLE
ENDPGM
ITEMLIB
CUSTLIB
ITEMLIB
CUSTLIB
The menu system uses three types of user profiles, shown in Table 110. Table 111
describes the objects used by the menu system.
Table 110. User Profiles for Menu System
Profile Type
Description
Password
Limit
Special
Capabilities Authorities
Initial
Menu
*NONE
N/A
As needed by N/A
application
Yes
*YES
None
MENU1
*NONE
N/A
None
N/A
The current library specified in the application user profile is used to store any queries created. The
Attention-key-handling program is *ASSIST, giving the user access to basic system functions.
Owner
Public
Authority
See Note
*EXCLUDE
*EXCLUDE
QRYSTART program in
QGPL
QRYUSR
*EXCLUDE
ITEMLIB
ICPGMLIB
OWNIC
OWNIC
*EXCLUDE
*EXCLUDE
Private Authorities
Additional Information
219
Owner
Public
Authority
Private Authorities
Additional Information
220
you want to provide the convenience of starting query from application menus as
well as from the initial menu, you can set up the QRYSTART program to ignore
adopted authority.
Note: Programs That Ignore Adopted Authority on page 139 provides more
information about ignoring adopted authority. Flowchart 8: How Adopted
Authority Is Checked on page 169 describes how the system checks for
adopted authority.
Figure 40 shows an application menu that includes the QRYSTART program:
ICMENU
Issues (ICPGM1)
Receipts (ICPGM2)
Purchases (ICPGM3)
Query (QRYSTART)
The authority information for the QRYSTART program is the same as shown in
Table 111 on page 219. The program is created with the use adopted authority
(USEADPAUT) parameter set to *NO, to ignore the adopted authority of previous
programs in the stack.
Following are comparisons of the program stacks when USERA selects query from
MENU1 (see Figure 37 on page 218) and from ICMENU:
Program stack when query selected from MENU1
MENU1 (no adopted authority)
QRYSTART (adopted authority QRYUSR)
Program stack when query selected from ICMENU
MENU1 (no adopted authority)
ICMENU (adopted authority OWNIC)
QRYSTART (adopted authority QRYUSR)
By specifying the QRYSTART program with USEADPAUT(*NO), the authority of
any previous programs in the stack is not used. This allows USERA to run query
from ICMENU without having the ability to change and delete files, because the
authority of OWNIC is not used by the QRYSTART program.
When USERA ends query and returns to ICMENU, adopted authority is once
again active. Adopted authority is ignored only as long as the QRYSTART program
is active.
If public authority to the QRYSTART program is *USE, specify USEADPAUT(*NO)
as a security precaution. This prevents anyone running under adopted authority
from calling the QRYSTART program and performing unauthorized functions.
221
The inquiry menu (Figure 36 on page 218) at the JKL Toy Company also uses this
technique, because it can be called from menus in different application libraries. It
adopts the authority of QRYUSR and ignores any other adopted authority in the
program stack.
Library:
Library:
QGPLOption number: 3
Description:
Query
QGPL
v To prevent most users from seeing the System Request Menu, revoke public
authority and grant *USE authority to specific users:
RVKOBJAUT OBJ(QSYS/QGMNSYSR) +
OBJTYPE(*PNLGRP) +
USER(*PUBLIC) AUT(*ALL)
GRTOBJAUT OBJ(QSYS/QGMNSYSR) +
OBJTYPE(*PNLGRP)
+
USER(USERA) AUT(*USE)
222
You can prevent users from selecting specific options from the System Request
Menu by restricting the authority to the associated commands. Table 112 shows the
commands associated with the menu options:
Table 112. Options and Commands for the System Request Menu
Option
Command
1
2
3
4
5
6
7
10
11
12
13
14
15
50
80
90
Notes:
1. Options 10, 11, 13, 14, and 15 are displayed only if display station pass-through has been
started with the Start Pass-Through (STRPASTHR) command. Option 10, 13, and 14 are
only displayed on the target system.
2. Option 12 is only displayed when 3270 emulation is active.
3. Option 50 is displayed only if a remote jobs is active.
4. Some of the options have restrictions for the System/36 environment.
If a user selects an option for which the user does not have authority, a message is
displayed.
If you want to prevent users from general use of the commands from the System
Request menu but still want them to be able to run a command at a specific time
(such as sign-off), you can create a CL program that adopts the authority of an
authorized user and runs the command.
223
224
accessing certain record types. A logical file can be used to specify a subset of fields
in a record that a user can access. Therefore, specific users can be prevented from
accessing certain fields in a record.
A logical file does not contain any data. It is a particular view of one or more
physical files that contain the data. Providing access to the information defined by
a logical file requires data authority to both the logical file and the associated
physical files.
Figure 42 shows an example of a physical file and three different logical files
associated with it.
Members of the sales department (group profile DPTSM) are allowed to view all
fields, but they cannot change the credit limit. Members of the accounts receivable
department (group profile DPTAR) are allowed to view all fields, but they cannot
change the sales field. The authority to the physical file looks like this:
Table 113. Physical File Example: CUSTMAST File
Users
Authority
Object Authorities
*OBJOPR
*OBJMGT
*OBJEXIST
*OBJALTER
*OBJREF
Data Authorities
*READ
*ADD
*UPD
*DLT
*EXECUTE
*PUBLIC
X
X
X
X
X
*EXCLUDE
225
The public should have all data rights but no operational rights to the CUSTMAST
physical file. The public cannot access the CUSTMAST file directly because
*OBJOPR authority is required to open a file. The publics authority makes all the
data rights potentially available to users of the logical file.
Authority to the logical files looks like this:
|
|
|
|
|
|
|
|
|
|
|
|
||
CUSTINFO
CUSTLIB
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
|
|
|
|
|
|
|
|
|
|
|
|
|
||
Group
OWNAR
*NONE
*SYSBAS
*NONE
Object
Authority
*USE
CUSTCRDT
CUSTLIB
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
|
|
|
|
|
|
|
|
|
|
|
|
|
||
Group
OWNAR
DPTAR
*SYSBAS
*NONE
Object
Authority
*CHANGE
*USE
CUSTSLS
CUSTLIB
*FILE
Owner . . . . . . . :
Primary group . . . :
ASP device . . . . . :
Group
OWNSM
DPTSM
*SYSBAS
*NONE
Object
Authority
*CHANGE
*USE
Making the group profile, such as DPTSM, the primary group for the logical file is
not necessary for this authority scheme to work. However, using primary group
authority eliminates searching private authorities for both the user attempting to
access the file and the users group. Case 2: Using Primary Group Authority on
page 174 shows how using primary group authority affects the authority checking
process.
226
You can specify data authorities for logical files beginning with V3R1 of the
OS/400 licensed program. When you move to V3R1 from an earlier version, the
system converts your logical files when the system is installed. The first time a
logical file is accessed, the system gives it all data authorities.
To use logical files as a security tool, do this:
v Grant all data authorities to the underlying physical files.
v Revoke *OBJOPR from the physical files. This prevents users from accessing the
physical files directly.
v Grant the appropriate data authorities to logical files. Revoke any authorities
you do not want.
v Grant *OBJOPR to the logical files.
Overriding Files
Override commands can be used to have a program use a different file with the
same format. For example, assume that a program in the contracts and pricing
application at the JKL Toy Company writes pricing information to a work file
before making price changes. A user with access to a command line who wanted to
capture confidential information could use an override command to cause the
program to write data to a different file in a library controlled by the user. You can
make sure a program processes the correct files by using override commands with
SECURE(*YES) before the program runs.
227
v Authorization lists provide a good way to secure files. If you use private
authorities, each user will have a private authority for each file member. If you
use an authorization list, each user will have only one authority. Also, files that
are open cannot have authority granted to the file or revoked from the file. If
you secure the file with an authorization list, you can change the authorities,
even when the file is open.
v Authorization lists provide a way to remember authorities when an object is
saved. When an object is saved that is secured by an authorization list, the name
of the authorization list is saved with the object. If the object is deleted and
restored to the same system, it is automatically linked to the authorization list
again. If the object is restored on a different system, the authorization list is not
linked, unless ALWOBJDIF(*ALL) is specified on the restore command.
228
4. The system now treats GRPIC as a group profile and assigns a gid to it.
229
Note: The sequence in which private authorities are specified for an object has
no effect on authority checking performance.
v If you plan to use multiple groups, study the authority checking process
described in How the System Checks Authority on page 156. Be sure you
understand how using multiple groups in combination with other authority
techniques, such as authorization lists, may affect your system performance.
230
Authorization
List
Group Profile
Yes
Yes
Yes
Yes
Yes
No
Yes
No
Yes
Yes
Yes
Yes
No
No
Yes
Yes 1
Yes
Yes
Yes
No
The group profile can be given authority when an object is created by using the
GRPAUT parameter in the profile of the user creating an object.
231
v Develop a plan for assigning ownership of applications when they are moved
into production. To control changes to a production application, all application
objects, including programs, should be owned by the user profile designated for
the application.
Application objects should not be owned by a programmer because the
programmer would have uncontrolled access to them in a production
environment. The profile that owns the application may be the profile of the
individual responsible for the application, or it may be a profile specifically
created as the application owner.
232
To create and delete validation lists, you can use the CL commands Create
Validation List (CRTVLDL) and the Delete Validation List (DLTVLDL). Application
Programming Interfaces (APIs) are also provided to allow applications to add,
change, remove, verify (authenticate), and find entries in a validation list. For more
information and examples, see the API topic in the Information Center
(seePrerequisite and related information on page xvi for details).
Validation list objects are available for all applications to use. For example, if an
application requires a password, the application passwords can be stored in a
validation list object rather than a database file. The application can use the
validation list APIs to verify a users password, which is encrypted, rather than the
application performing the verification itself.
In Version 4, Release 1, the authentication information (password, PIN, account
number) that is associated with a validation list is always stored in a
nondecryptable form, which cannot be returned to the user.
In Version 4, Release 2, you can choose to store the authentication information in a
decryptable form. If a user has the appropriate security, the authentication
information can be decrypted and returned to the user. For information about
controlling the storage of decryptable data in validation lists, see Retain Server
Security (QRETSVRSEC) on page 32.
Register a function
Retrieve information about the function
Define who can or cannot use the function
Check to see if the user is allowed to use the function
To use this support within an application, the application provider must register
the functions when the application is installed. The registered function corresponds
to a code block for specific functions in the application. When the user runs the
application, the application calls the check usage API to see if the user is allowed
to use the function that is associated with the code block, before invoking the code
block. If the user is allowed to use the registered function, the code block is run. If
the user is not allowed to use the function, the user is prevented from running the
code block.
The system administrator specifies who is allowed or denied access to a function.
The administrator can either use the API to manage the access to program function
or use the iSeries Navigator. The OS/400 API section in the Information Center
provides information about the limit access to program function APIs.
233
234
SAVCHGOBJ
SAVOBJ
SAVLIB
SAVSECDTA SAVDLO
SAVSYS
SAVCFGRSTUSRPRF
X
RSTAUT
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
RSTOBJ
RSTLIB
RSTDLO
RSTCFG
X
X
X
X
The SAVSECDTA, SAVSYS, and RSTUSRPRF commands save and restore ownership, primary group,
primary group authority, and public authority for these object types : User profile (*USRPRF), Authorization
list (*AUTL), and Authority holder (*AUTHLR).
235
236
237
Restoring Objects
When you restore an object to the system, the system uses the authority
information stored with the object. The following applies to security of the restored
object:
238
Object ownership:
v If the profile that owns the object is on the system, ownership is restored to that
profile.
v If the owner profile does not exist on the system, ownership of the object is
given to the QDFTOWN (default owner) user profile.
v If the object exists on the system and the owner on the system is different from
the owner on the save media, the object is not restored unless
ALWOBJDIF(*ALL) is specified. In that case, the object is restored and the owner
on the system is used.
v See Restoring Programs on page 241 for additional considerations when
restoring programs.
Primary group:
For an object that does not exist on the system:
v If the profile that is the primary group for the object is on the system, the
primary group value and authority are restored for the object.
v If the profile that is the primary group does not exist on the system:
The primary group for the object is set to none.
The primary group authority is set to no authority.
When an existing object is restored, the primary group for the object is not
changed by the restore operation.
Public authority:
v If the object being restored does not exist on the system, public authority is set
to the public authority of the saved object.
v If the object being restored does exist and is being replaced, public authority is
not changed. The public authority from the saved version of the object is not
used.
v The CRTAUT for the library is not used when restoring objects to the library.
Authorization list:
v If an object, other than a document or folder, already exists on the system and is
linked to an authorization list, the ALWOBJDIF parameter determines the result:
If ALWOBJDIF(*NONE) is specified, the existing object must have the same
authorization list as the saved object. If not, the object is not restored.
If ALWOBJDIF(*ALL) is specified, the object is restored. The object is linked
to the authorization list associated with the existing object.
v If a document or folder that already exists on the system is restored, the
authorization list associated with the object on the system is used. The
authorization list from the saved document or folder is not used.
v If the authorization list does not exist on the system, the object is restored
without being linked to an authorization list and the public authority is changed
to *EXCLUDE.
v If the object is being restored on the same system from which it was saved, the
object is linked to the authorization list again.
v If the object is being restored on a different system, the ALWOBJDIF parameter
on the restore command is used to determine whether the object is linked to the
authorization list:
If ALWOBJDIF(*ALL) is specified, the object is linked to the authorization list.
Chapter 8. Backup and Recovery of Security Information
239
240
Restoring Authority
When security information is restored, private authorities must be rebuilt. When
you restore a user profile that has an authority table, the authority table for the
profile is also restored.
The Restore Authority (RSTAUT) command rebuilds the private authority in the
user profile using the information from the authority table. The grant authority
operation is run for each private authority in the authority table. If authority is
being restored for many profiles and many private authorities exist in the authority
tables, this can be a lengthy process.
The RSTUSRPRF and RSTAUT commands can be run for a single profile, a list of
profiles, a generic profile name, or all profiles. The system searches the save media
or save file created by the SAVSECDTA or SAVSYS command or the QSRSAVO
API to find the profiles you want to restore.
Restoring Field Authority:
The following steps are required to restore private field authorities for database
files that do not already exist on the system:
v Restore or create the necessary user profiles.
v Restore the files.
v Run the Restore Authority (RSTAUT) command.
The private field authorities are not fully restored until the private object
authorities that they restrict are also established again.
Restoring Programs
Restoring programs to your system that are obtained from an unknown source
poses a security exposure. Programs might perform operations that break your
security requirements. Of particular concern are programs that contain restricted
instructions, programs that adopt their owner authority, and programs that have
been tampered with. This includes object types *PGM, *SRVPGM, *MODULE, and
*CRQD. You can use the QVFYOBJRST, QFRCCVNRST, and QALWOBJRST system
values to prevent these object types from being restored to your system. See
Security-Related Restore System Values for more information about these system
values.
|
|
|
|
The system uses a validation value to help protect programs. This value is stored
with a program and recalculated when the program is restored. The systems
actions are determined by the ALWOBJDIF parameter on the restore command and
the force conversion on restore (QFRCCVNRST) system value.
Note: Programs that are created for iSeries Version 5 Release 1 or later contain
information that allows the program to be re-created at restore time if
necessary. The information needed to re-create the program remains with the
program even when the observability of the program is removed. If a
program validation error is determined to exist at the time the program is
Chapter 8. Backup and Recovery of Security Information
241
242
PGM
RSTLICPGM CPAPP
ENDPGM
3. Create the CPINST program to adopt the authority of a user with *ALLOBJ
special authority, such as QSECOFR, and authorize OWNCP to the program:
CRTCLPGM QGPL/CPINST USRPRF(*OWNER) +
AUT(*EXCLUDE)
GRTOBJAUT OBJ(CPINST) OBJTYP(*PGM) +
USER(OWNCP) AUT(*USE)
4. Sign on as OWNCP and call the CPINST program. When the CPINST program
runs the RSTLICPGM command, you are running under QSECOFR authority.
When the exit program runs to install the CPAPP programs, it drops adopted
authority. The programs called by the exit program run under the authority of
OWNCP.
3. Restore users private authorities to the list using the RSTAUT command.
243
Attention: This procedure restores user profile values from the save media. See
Restoring User Profiles on page 237 for more information.
Recovering the Association of Objects to the Authorization List: When the
damaged authorization list is deleted, the objects secured by the authorization list
need to be added to the new authorization list. Do the following:
1. Find the objects that were associated with the damaged authorization list using
the Reclaim Storage (RCLSTG) command. Reclaim storage assigns the objects
that were associated with the authorization list to the QRCLAUTL
authorization list.
2. Use the Display Authorization List Objects (DSPAUTLOBJ) command to list the
objects associated with the QRCLAUTL authorization list.
3. Use the Grant Object Authority (GRTOBJAUT) command to secure each object
with the correct authorization list:
GRTOBJAUT OBJ(library-name/object-name) +
OBJTYPE(object-type) +
AUTL(authorization-list-name)
7. Press F3 (exit) until you return to the IPL or Install the System menu.
8. Complete the manual IPL and return the keylock to its normal position.
Notes:
1. If you no longer want to secure the installation of the operating system, follow
the same steps and specify 2 (not secure).
2. You can also prevent installation of the operating system by keeping your
keylock switch in the normal position and removing the key.
244
*SAVSYS special authority gives a user the capability to save an object and take it
to a different system to be restored or to display (dump) the media to view the
data. It also gives a user the capability to save an object and free storage thus
deleting the data in the object. When saving documents, a user with *SAVSYS
special authority has the option to delete those documents. *SAVSYS special
authority should be given carefully.
245
246
247
This list serves as a review of the information in this book. The list contains brief
descriptions of how to do each item and how to monitor that it has been done,
including what entries in the QAUDJRN journal to look for. Details about the
items are found throughout the book.
Physical Security
Note: The Basic System Security and Planning topic in the Information Center
contains a complete discussion of physical security on the iSeries system.
See Prerequisite and related information on page xvi for details.
The system unit and system console are in a secure location.
Backup media is protected from damage and theft.
The keylock switch setting on the processor unit is in the Secure or Auto
position. The key is removed. The keys are kept separately, both under tight
physical security. See the Information Center for more information about the
keylock switch (see Prerequisite and related information on page xvi for
details).
Access to publicly located workstations and the console is restricted. Use the
DSPOBJAUT command to see who has *CHANGE authority to the
workstations. Look for AF entries in the audit journal with the object type field
equal to *DEVD to find attempts to sign on at restricted workstations.
Sign-on for users with *ALLOBJ or *SERVICE special authority is limited to a
few workstations. Check to see that the QLMTSECOFR system value is 1. Use
the DSPOBJAUT command for devices to see if the QSECOFR profile has
*CHANGE authority.
System Values
Security system values follow recommended guidelines. To print the security
system values, type: WRKSYSVAL *SEC OUTPUT(*PRINT). Two important system
values to audit are:
QSECURITY, which should be set to 40 or higher.
QMAXSIGN, which should not be greater than 5.
Note: If the auditing function is active, an SV entry is written to the QAUDJRN
journal whenever a system value is changed.
Decisions about system values are reviewed periodically, particularly when the
system environment changes, such as the installation of new applications or a
communications network.
248
are changed, start DST and attempt to use the default values. See the topic
Working with service tools user IDs on page 117 for more information.
Signing on with IBM-supplied user profiles, except QSECOFR, is not
recommended. These IBM-supplied profiles are designed to own objects or to
run system functions. Use a DSPAUTUSR list to verify that the following
IBM-supplied user profiles have a password of *NONE:
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
QAUTPROF
QBRMS
QCLUMGT
QCLUSTER
QCOLSRV
QDBSHR
QDBSHRDO
QDFTOWN
QDIRSRV
QDLFM
QDOC
QDSNX
QEJB
QFNC
QIPP
QGATE
QLPAUTO
QLPINSTALL
QMSF
QNETSPLF
QNFSANON
QNTP
QPEX
QPGMR
QPM400
QRJE
QSNADS
QSPL
QSPLJOB
QSRV
QSRVBAS
QSYS
QSYSOPR
QTCM
QTCP
QTFTP
QTMHHTP1
QTMHHTTP
QTSTRQS
QUSER
QYPSJSVR
Password Control
Users can change their own passwords. Allowing users to define their own
passwords reduces the need for users to write down their passwords. Users
should have access to the CHGPWD command or to the Change Password
function from the Security (GO SECURITY) menu.
A password change is required according to the organizations security
guidelines, usually every 30 to 90 days. The QPWDEXPITV system value is set
to meet the security guidelines.
If a user profile has a password expiration interval that is different from the
system value, it meets the security guidelines. Review user profiles for a
PWDEXPITV value other than *SYSVAL.
Trivial passwords are prevented by using the system values to set the password
rules and by using a password approval program. Use the WRKSYSVAL *SEC
command and look at the settings for the values beginning with QPWD.
Group profiles have a password of *NONE. Use the DSPAUTUSR command to
check for any group profiles that have passwords.
Whenever the system is not operating at password level 3 and users change their
password, the system will attempt to create an equivalent password that is usable
at the other password levels, if possible. You can use the DSPAUTUSR or
PRTUSRPRF TYPE(*PWDINFO) commands to see which user profiles have
passwords that are usable at the various password levels.
Note: The equivalent password is a best effort attempt to create a usable password
for the other password levels but it may not have passed all of the password
rules if the other password level was in effect. For example, if password
BbAaA3x is specified at password level 2, the system will create an
equivalent password of BBAAA3X for use at password levels 0 and 1. This
would be true even if the QPWDLMTCHR system value includes A as one
of the limited characters (QPWDLMTCHR is not enforced at password level
2) or QPWDLMTREP system value specified that consecutive characters
249
cannot be the same (because the check is case sensitive at password level 2
but case insensitive at password levels 0 and 1).
You should use a naming convention for group profiles. When authorities are
displayed, you can then easily recognize the group profile.
The administration of user profiles is adequately organized. No user profiles
have large numbers of private authorities. The topic Examining Large User
Profiles on page 278 discusses how to find and examine large user profiles on
your system.
Employees are removed from the system immediately when they are
transferred or released. Regularly review the DSPAUTUSR list to make sure
only active employees have access to the system. The DO (Delete Object) entries
in the audit journal can be reviewed to make sure user profiles are deleted
immediately after employees leave.
Management regularly verifies the users authorized to the system. You can use
the DSPAUTUSR command for this information.
The password for an inactive employee is set to *NONE. Use the DSPAUTUSR
command to verify that the inactive user profiles do not have passwords.
Management regularly verifies the users with special authorities, particularly
*ALLOBJ *SAVSYS, and *AUDIT special authorities. The topic Printing
Selected User Profiles on page 278 gives an example of how to determine this.
Authorization Control
Owners of data understand their obligation to authorize users on a
need-to-know basis.
Owners of objects regularly verify the authority to use the objects, including
public authority. The WRKOBJOWN command provides a display for working
with the authorities to all objects owned by a user profile.
Sensitive data is not public. Check the authority for user *PUBLIC for critical
objects using the DSPOBJAUT command.
250
To check the User parameter of a job description, use the Display Job
Description (DSPJOBD) command. To check the authority to a job description,
use the DSPOBJAUT command.
Note: At security level 40 or 50, a user submitting a job using a job description
that specifies a user profile name must have *USE authority to both the
job description and the user profile. At all security levels, an attempt to
submit or schedule a job without *USE authority to the user specified in
the job description causes an AF entry with violation type J in the audit
journal.
Users are not allowed to sign on by pressing the Enter key on the Sign On
display. Make sure no workstation entries in subsystem descriptions specify a
job description that has a user profile name specified for the USER parameter.
Default sign-on is prevented at security level 40 or 50, even if a subsystem
description allows it. At all security levels, an AF entry with violation type S is
written to the audit journal if default sign-on is attempted and a subsystem
description is defined to allow it.
The library list in application programs is controlled to prevent a library that
contains a similar program from being added before the production libraries.
The topic Library Lists on page 193 discusses methods for controlling the
library list.
Programs that adopt authority are used only when required and are carefully
controlled. See the topic Analyzing Programs That Adopt Authority on
page 279 for an explanation of how to evaluate the use of the program adopt
function.
Application program interfaces (APIs) are secured.
Good object security techniques are used to avoid performance problems.
Unauthorized Access
Security-related events are logged to the security auditing journal (QAUDJRN)
when the auditing function is active. To audit authority failures, use the
following system values and settings:
QAUDCTL must be set to *AUDLVL
QAUDLVL must include the values of *PGMFAIL and *AUTFAIL.
The best method to detect unauthorized attempts to access information is to
review entries in the audit journal on a regular basis.
251
The QMAXSIGN system value limits the number of consecutive incorrect access
attempts to five or less. The QMAXSGNACN system value is set at 2 or 3.
The QSYSMSG message queue is created and monitored.
The audit journal is audited for repeated attempts by a user. (Authorization
failures cause AF type entries in the audit journal.)
Programs fail that attempt to access objects using interfaces that are not
supported. (QSECURITY system value is set to 40 or 50.)
User ID and password are required to sign on. Security levels 40 and 50 enforce
this. At level 20 or 30, you must ensure that no subsystem descriptions have a
workstation entry which uses a job description that has a user profile name.
Unauthorized Programs
The QALWOBJRST system value is set to *NONE to prevent anyone from
restoring security-sensitive programs to the system.
The Check Object Integrity (CHKOBJITG) command is run periodically to
detect unauthorized changes to program objects. This command is described in
Checking for Objects That Have Been Altered on page 280.
Communications
Telephone communications is protected by call-back procedures.
Encryption is used on sensitive data.
Remote sign-on is controlled. The QRMTSIGN system value is set to
*FRCSIGNON or a pass-through validation program is used.
Access to data from other systems, including personal computers, is controlled
using the JOBACN, PCSACC, and DDMACC network attributes. The JOBACN
network attribute should be *FILE.
252
The security auditing function is optional. You must take specific steps to set up
security auditing.
The following sections describe how to plan, set up, and manage security auditing,
what information is recorded, and how to view that information. Appendix F
shows record layouts for the audit journal entries. Appendix E describes what
operations are audited for each type of object.
253
Possible Value
Available on
QAUDLVL System
Value
Available on
CHGUSRAUD
Command
*NONE
Yes
Yes
*AUTFAIL
Yes
No
*CMD
No
Yes
*CREATE
Yes
Yes
*DELETE
Yes
Yes
*JOBDTA
Yes
Yes
*OBJMGT
Yes
Yes
*OPTICAL
Yes
Yes
*NETCMN
Yes
No
254
Description
If the QAUDLVL system value is *NONE, no
actions are logged on a system-wide basis.
Actions are logged for individual users based on
the AUDLVL value in their user profiles.
If the AUDLVL value in a user profile is *NONE,
no additional action auditing is done for this
user. Any actions specified for the QAUDLVL
system value are logged for this user.
Authorization failures: Unsuccessful attempts to
sign on the system and to access objects are
logged. *AUTFAIL can be used regularly to
monitor users trying to perform unauthorized
functions on the system. *AUTFAIL can also be
used to assist with migration to a higher security
level and to test resource security for a new
application.
Commands: The system logs command strings
run by a user. If a command is run from a CL
program that is created with LOG(*NO) and
ALWRTVSRC(*NO), only the command name
and library name are logged. *CMD may be used
to record the actions of a particular user, such as
the security officer.
Creating objects: The system writes a journal
entry when a new or replacement object is
created. *CREATE may be used to monitor when
programs are created or recompiled.
Deleting objects: The system writes a journal
entry when an object is deleted.
Job tasks: Actions that affect a job are logged,
such as starting or stopping the job, holding,
releasing, canceling, or changing it. *JOBDTA
may be used to monitor who is running batch
jobs.
Object management tasks: Moving an object to
a different library or renaming it is logged.
*OBJMGT may be used to detect copying
confidential information by moving the object to
a different library.
Optical functions: All optical functions are
audited, including functions related to optical
files, optical directories, optical volumes, and
optical cartridges. *OPTICAL may be used to
detect attempts to create or delete an optical
directory.
Network Communications Auditing: The
violations detected by the APPN Filter support
are logged to the security auditing journal when
the Directory search filter and the End point
filter are audited.
Possible Value
Available on
QAUDLVL System
Value
Available on
CHGUSRAUD
Command
*PGMADP
Yes
Yes
*PGMFAIL
Yes
No
*PRTDTA
Yes
No
*SAVRST
Yes
Yes
*SECURITY
Yes
Yes
*SERVICE
Yes
Yes
*SPLFDTA
Yes
Yes
*SYSMGT
Yes
Yes
Description
Adopting authority: The system writes a journal
entry when adopted authority is used to gain
access to an object. *PGMADP may be used to
test where and how a new application uses
adopted authority.
Program failures: The system writes a journal
entry when a program causes an integrity error.
*PGMFAIL may be used to assist with migration
to a higher security level or to test a new
application.
Printing functions: Printing a spooled file,
printing directly from a program, or sending a
spooled file to a remote printer is logged.
*PRTDTA may be used to detect printing
confidential information.
Restore operations: *SAVRST may be used to
detect attempts to restore unauthorized objects.
Security tasks: Security-relevant events, such as
changing a user profile or system value, are
logged. *SECURITY may be used to keep a
record of all security activity.
Service tasks: The use of service tools, such as
DMPOBJ (Dump Object) and STRCPYSCN (Start
Copy Screen), is logged. *SERVICE may be used
to detect attempts to circumvent security by
using service tools.
Operations on spooled files: Actions performed
on spooled files are logged, including creating,
copying, and sending. *SPLFDTA may be used to
detect attempts to print or send confidential
data.
System management tasks: The system writes a
journal entry for system management activities,
such as changing a reply list or the power on/off
schedule. *SYSMGT may be used to detect
attempts to use system management functions to
circumvent security controls.
Model Database
Outfile
QASYAFJE/J4/J5
Detailed Entry
A
F
G
J
Description
Attempt made to access an object or
perform an operation to which the
user was not authorized.
ICAPI authorization error
ICAPI authentication error
Attempt made to submit or schedule
a job under a job description which
has a user profile specified. The
submitter did not have *USE
authority to the user profile.
255
Model Database
Outfile
Detailed Entry
N
P
S
T
U
V
W
X
Y
Z
AU
QASYAUJ5
CV
DI
QASYCVJ4/J5
QASYDIJ4/J5
GR
KF
IP
PW
QASYGRJ4/J5
QASYKFJ4/J5
QASYIPJE/J4/J5
QASYPWJE/J4/J5
E
E
AF
PW
R
F
P
F
A
D
E
*CMD
VO
QASYVOJ4/J5
P
U
X
Y
Z
U
VC
QASYVCJE/J4/J5
VN
QASYVNJE/J4/J5
VP
QASYVPJE/J4/J5
CD
QASYCDJE/J4/J5
C
L
O
256
Description
Profile token not a regenerable profile
token
Attempt made to use a profile handle
that is not valid on the QWTSETP
API.
Attempt made to sign on without
entering a user ID or a password.
Not authorized to TCP/IP port
A user permission request was not
valid.
Profile token not valid for generating
new profile token
Profile token not valid for swap
Operation violation
Not authorized to the current JUID
field during a clear JUID operation
Not authorized to the current JUID
field during a set JUID operation
Enterprise Identity Mapping (EIM)
configuration change
Connection ended abnormally
Authority failures
Password failures
Connection rejected
Function registration operations.
An incorrect password was entered.
Authority failure for an IPC request.
APPC bind failure.
An incorrect DST user name was
entered.
An incorrect DST password was
entered.
An incorrect password was entered.
User name not valid
Service tools user is disabled
Service tools user not valid
Service tools password not valid
Unsuccessful verify of a validation
list entry.
A connection was rejected because of
incorrect password.
A network logon was rejected
because of expired account, incorrect
hours, incorrect user id, or incorrect
password.
An incorrect network password was
used.
A command was run.
An S/36E control language statement
was run.
An S/36E operator control command
was run.
Model Database
Outfile
Detailed Entry
P
S
U
*CREATE
*DELETE
*JOBDTA
CO
QASYCOJE/J4/J5
DI
DO
QASYDIJ4/J5
QASYDOJE/J4/J5
DI
JS
QASYDIJ4/J5
QASYJSJE/J4/J5
N
R
CO
A
C
D
P
R
DO
A
B
C
E
H
I
M
N
P
Q
R
S
T
*NETCMN
SG
QASYSGJE/J4/J5
VC
QASYVCJE/J4/J5
VN
QASYVNJE/J4/J5
VS
QASYVSJE/J4/J5
CU
QASYCUJE/J4/J5
U
A
P
S
E
F
O
S
E
M
R
CV
QASYCVJ4/J5
IR
QASYIRJ4/J5
C
E
L
N
Description
An S/36E procedure was run.
Command run after command
substitution took place.
An S/36E utility control statement
was run.
Creation of a new object, except
creation of objects in QTEMP library.
Replacement of existing object.
Object create
Object deleted
Pending delete committed
Pending create rolled back
Delete pending
Pending delete rolled back
Object delete
The ENDJOBABN command was
used.
A job was submitted.
A job was changed.
A job was ended.
A job was held.
A job was disconnected.
Modify profile or group profile.
The ENDJOB command was used.
A program start request was attached
to a prestart job.
Query attributes changed.
A held job was released.
A job was started.
Modify profile or group profile using
a profile token.
CHGUSRTRC command.
Asynchronous AS/400 signal process.
Asynchronous Private Address Space
Environment (PASE) signal processed.
A connection was started.
A connection was ended.
Logoff requested.
Logon requested.
A server session was started.
A server session was ended.
Creation of an object by the cluster
control operation.
Creation of an object by the Cluster
Resource Group (*GRP) management
operation.
Connection established.
Connection ended normally.
IP rules have been loaded from from
a file.
IP rule have been unloaded for an IP
Security connection.
257
258
Model Database
Outfile
Detailed Entry
P
R
U
IS
QASYISJ4/J5
ND
QASYNDJE/J4/J5
1
2
A
NE
QASYNEJE/J4/J5
SK
QASYSKJ4/J5
DI
OM
QASYDIJ4/J5
QASYOMJE/J4/J5
A
C
F
R
OM
M
ML
SD
QASYMLJE/J4/J5
QASYSDJE/J4/J5
R
O
S
O1
QASY01JE/J4/J5
O2
QASY02JE/J4/J5
O3
QASY03JE/J4/J5
AP
QASYAPJE/J4/J5
R
U
D
C
X
C
R
B
S
M
I
B
N
C
M
E
L
A
R
S
Description
IP rules have been loaded for and IP
Security connection.
IP rules have been read and copied to
a file.
IP rules have been unloaded
(removed).
Phase 1 negotiation.
Phase 2 negotiation.
A violation was detected by the
APPN Filter support when the
Directory search filter was audited.
A violation is detected by the APPN
Filter support when the End point
filter is audited.
Accept
Connect
Filtered mail
Reject mail
Object rename
An object was moved to a different
library.
An object was renamed.
A mail log was opened.
A change was made to the system
distribution directory.
Open file or directory
Change or retrieve attributes
Delete file directory
Create directory
Release held optical file
Copy file or directory
Rename file
Backup file or directory
Save held optical file
Move file
Initialize volume
Backup volume.
Rename volume
Convert backup volume to primary
Import
Export
Change authorization list
Change volume attributes
Absolute read
A program started that adopts owner
authority. The start entry is written
the first time adopted authority is
used to gain access to an object, not
when the program enters the
program stack.
Model Database
Outfile
Detailed Entry
E
A
AF
QASYAFJE/J4/J5
B
C
E
R
PO
QASYPOJE/J4/J5
D
R
S
OR
QASYORJE/J4/J5
N
E
RA
QASYRAJE/J4/J5
RJ
QASYRJJE/J4/J5
RO
QASYROJE/J4/J5
RP
QASYRPJE/J4/J5
RQ
QASYRQJE/J4/J5
RU
QASYRUJE/J4/J5
Description
A program ended that adopts owner
authority. The end entry is written
when the program leaves the
program stack. If the same program
occurs more than once in the
program stack, the end entry is
written when the highest (last)
occurrence of the program leaves the
stack.
Adopted authority was used during
program activation.
A program ran a restricted machine
interface instruction.
A program which failed the
restore-time program validation
checks was restored. Information
about the failure is in the Validation
Value Violation Type field of the
record.
A program accessed an object
through an unsupported interface or
callable program not listed as a
callable API.
Hardware storage protection
violation.
Attempt made to update an object
that is defined as read-only.
(Enhanced hardware storage
protection is logged only at security
level 40 and higher)
Printer output was printed directly to
a printer.
Output sent to remote system to
print.
Printer output was spooled and
printed.
A new object was restored to the
system.
An object was restored that replaces
an existing object.
The system changed the authority to
an object being restored. 4
A job description that contains a user
profile name was restored.
The object owner was changed to
QDFTOWN during restore
operation.4
A program that adopts owner
authority was restored.
A *CRQD object with
PROFILE(*OWNER) was restored.
Authority was restored for a user
profile using the RSTAUT command.
259
260
Model Database
Outfile
Detailed Entry
RZ
QASYRZJE/J4/J5
AD
QASYADJE/J4/J5
D
O
U
CA
QASYCAJE/J4/J5
CP
QASYCPJE/J4/J5
CQ
CV
QASYCQJE/J4/J5
QASYCVJ4/J5
CY
QASYCYJ4/J5
DI
QASYDIJ4/J5
DS
QASYDSJE/J4/J5
A
C
E
R
A
F
M
AD
BN
CA
CP
OW
UB
A
EV
QASYEVJ4/J5
GR
QASYGRJ4/J5
GS
QASYGSJE/J4/J5
C
A
C
D
A
D
F
R
G
QASYIPJE/J4/J5
R
U
A
JD
QASYJDJE/J4/J5
C
D
G
A
KF
QASYKFJ4/J5
NA
QASYNAJE/J4/J5
IP
C
K
T
A
Description
The primary group for an object was
changed during a restore operation.
Auditing of a DLO was changed with
CHGDLOAUD command.
Auditing of an object was changed
with CHGOBJAUD command.
Auditing for a user was changed
with CHGUSRAUD command.
Changes to authorization list or object
authority.
Create, change, or restore operation
of user profile.
A *CRQD object was changed.
Connection established.
Connection ended normally.
Connection rejected.
Access Control function
Facility Control function
Master Key function
Audit change
Successful bind
Authority change
Password change
Ownership change
Successful unbind
Request to reset DST QSECOFR
password to system-supplied default.
DST profile changed.
Add.
Change.
Delete.
Exit program added
Edit program removed
Function registration operation
Exit program replaced
A socket descriptor was given to
another job. (The GS audit record is
created if it is not created for the
current job.)
Receive descriptor.
Unable to use descriptor.
The ownership or authority of an IPC
object was changed.
Create an IPC object.
Delete an IPC object.
Get an IPC object.
The USER parameter of a job
description was changed.
Certificate operation.
Key ring file operation.
Trusted root operation.
A network attribute was changed.
Model Database
Outfile
Detailed Entry
OW
PA
QASYOWJE/J4/J5
QASYPAJE/J4/J5
A
A
PG
QASYPGJE/J4/J5
PS
QASYPSJE/J4/J5
A
E
H
I
M
P
R
S
SE
QASYSEJE/J4/J5
SO
QASYSOJ4/J5
SV
QASYSVJE/J4/J5
VA
QASYVAJE/J4/J5
V
A
A
C
R
A
B
C
S
F
V
VU
QASYVUJE/J4/J5
X0
QASYX0J4/J5
G
M
U
1
2
3
4
5
6
7
8
9
A
B
C
Description
object ownership was changed.
A program was changed to adopt
owner authority.
The primary group for an object was
changed.
A target user profile was changed
during a pass-through session.
An office user ended work on behalf
of another user.
A profile handle was generated
through the QSYGETPH API.
All profile tokens were invalidated.
Maximum number of profile tokens
have been generated.
Profile token generated for user.
All profile tokens for a user have
been removed.
An office user started work on behalf
of another user.
User profile authenticated.
A subsystem routing entry was
changed.
Add entry.
Change entry.
Remove entry.
A system value was changed.
Service attributes were changed.
Change to system clock.
The access control list was changed
successfully.
The change of the access control list
failed.
Successful verify of a validation list
entry.
A group record was changed.
User profile global information
changed.
A user record was changed.
Service ticket valid.
Service principals do not match
Client principals do not match
Ticket IP address mismatch
Decryption of the ticket failed
Decryption of the authenticator failed
Realm is not within client and local
realms
Ticket is a replay attempt
Ticket not yet valid
Deecrypt of KRB_AP_PRIV or
KRB_AP_SAFE checksum error
Remote IP address mismatch
Local IP address mismatch
261
262
Model Database
Outfile
Detailed Entry
D
E
F
K
L
M
N
O
P
Q
ST
VV
QASYSTJE/J4/J5
QASYVVJE/J4/J5
SF
QASYSFJE/J4/J5
A
C
E
P
R
S
A
QASYDIJ4/J5
QASYSMJE/J4/J5
C
D
H
I
R
U
CF
B
DI
SM
C
D
F
N
O
P
S
T
VL
QASYVLJE/J4/J5
A
D
L
U
W
Description
KRB_AP_PRIV or KRB_AP_SAFE
timestamp error
KRB_AP_PRIV or KRB_AP_SAFE
replay error
KRB_AP_PRIV KRB_AP_SAFE
sequence order error
GSS accept - expired credential
GSS accept - checksum error
GSS accept - channel bindings
GSS unwrap or GSS verify expired
context
GSS unwrap or GSS verify
decrypt/decode
GSS unwrap or GSS verify checksum
error
GSS unwrap or GSS verify sequence
error
A service tool was used.
The service status was changed.
The server was stopped.
The server paused.
The server was restarted.
The server was started.
A spooled file was read by someone
other than the owner.
A spooled file was created.
A spooled file was deleted.
A spooled file was held.
An inline file was created.
A spooled file was released.
A spooled file was changed.
Configuration changes
Backup options were changed using
xxxxxxxxxx.
Automatic cleanup options were
changed using xxxxxxxxxx.
A DRDA* change was made.
An HFS file system was changed.
A network file operation was
performed.
A backup list was changed using
xxxxxxxxxx.
The power on/off schedule was
changed using xxxxxxxxxx.
The system reply list was changed.
The access path recovery times were
changed.
The account is expired.
The account is disabled.
Logon hours were exceeded.
Unknown or unavailable.
Workstation not valid.
Model Database
Outfile
DI
QASYDIJ4/J5
GR
LD
QASYGRJ4/J5
QASYLDJE/J4/J5
VF
QASYVFJE/J4/J5
Detailed Entry
IM
ZC
F
L
U
K
A
N
S
VO
QASYVOJ4/J5
VR
QASYVRJE/J4/J5
YC
QASYYCJE/J4/J5
ZC
DI
QASYZCJE/J4/J5
QASYDIJ4/J5
GR
YR
ZR
QASYGRJ4/J5
QASYYRJE/J4/J5
QASYZRJE/J4/J5
A
C
F
R
F
S
C
C
EX
ZR
F
R
R
Description
LDAP directory import
Object changes
Function registration operations6
Link a directory.
Unlink a directory.
Search a directory.
The file was closed because of
administrative disconnection.
The file was closed because of normal
client disconnection.
The file was closed because of session
disconnection.
Add validation list entry.
Change validation list entry.
Find validation list entry.
Remove validation list entry.
Resource access failed.
Resource access was successful.
A document library object was
changed.
An object was changed.
LDAP directory export
Object read
Function registration operations6
A document library object was read.
An object was read.
|
|
This value can only be specified for the QAUDLVL system value. It is not a value for the AUDLVL
parameter of a user profile.
|
|
This value can only be specified for the AUDLVL parameter of a user profile. It is not a value for the
QAUDLVL system value.
|
|
If object auditing is active for an object, an audit record is written for a create, delete, object management, or
restore operation even if these actions are not included in the audit level.
|
|
See the topic Restoring Objects on page 238 for information about authority changes which may occur
when an object is restored.
When *ALL is specified, the entries for both *CHANGE and *ALL (DI, YC, YR, ZC, ZR) are written.
|
|
263
*NONE
*CHANGE
*ALL
*NONE
*USRPRF
*CHANGE
*ALL
None
None
Change
Change and Use
None
Change
Change
Change and Use
None
Change and Use
Change
Change and Use
You can use object auditing to keep track of all users accessing a critical object on
the system. You can also use object auditing to keep track of all the object accesses
by a particular user. Object auditing is a flexible tool that allows you to monitor
those object accesses that are important to your organization.
Taking advantage of the capabilities of object auditing requires careful planning.
Poorly designed auditing may generate many more audit records than you can
analyze, and can have a severe impact on system performance. For example,
setting the OBJAUD value to *ALL for a library results in an audit entry being
written every time the system searches for an object in that library. For a heavily
used library on a busy system, this would generate a very large number of audit
journal entries.
The following are some examples of how to use object auditing.
v If certain critical files are used throughout your organization, you may
periodically review who is accessing them using a sampling technique:
1. Set the OBJAUD value for each critical file to *USRPRF using the Change
Object Auditing command:
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
file-name
library-name
*FILE
*
*USRPRF
2. Set the OBJAUD value for each user in your sample to *CHANGE or *ALL
using the CHGUSRAUD command.
3. Make sure the QAUDCTL system value includes *OBJAUD.
4. When sufficient time has elapsed to collect a representative sample, set the
OBJAUD value in the user profiles to *NONE or remove *OBJAUD from the
QAUDCTL system value.
5. Analyze the audit journal entries using the techniques described in
Analyzing Audit Journal Entries with Query or a Program on page 274.
v If you are concerned about who is using a particular file, you can collect
information about all accesses of that file for a period of time:
1. Set object auditing for the file independent of user profile values:
CHGOBJAUD OBJECT(library-name/file-name)
OBJTYPE(*FILE) OBJAUD(*CHANGE or *ALL)
264
*ALL
*ALLAVL
*ALL
*
*USRPRF
This command affects the auditing value of new objects only. It does not change
the auditing value of objects that already exist in the library.
Use the default auditing values carefully. Improper use could result in many
unwanted entries in the security audit journal. Effective use of the object auditing
capabilities of the system requires careful planning.
265
QAUDFRCLVL system value works like the force level for database files. You
should follow similar guidelines in determining the correct force level for your
installation.
If you allow the system to determine when to write entries to auxiliary storage, it
balances the performance impact against the potential loss of information in a
power outage. *SYS is the default and the recommended choice.
If you set the force level to a low number, you minimize the possibility of losing
audit records, but you may notice a negative performance impact. If your
installation requires that no audit records be lost in a power failure, you must set
the QAUDFRCLVL to 1.
Audit End Action: The QAUDENDACN system value determines what the
system does if it is unable to write an entry to the audit journal. The default value
is *NOTIFY. The system does the following if it is unable to write audit journal
entries and QAUDENDACN is *NOTIFY:
1. The QAUDCTL system value is set to *NONE to prevent additional attempts to
write entries.
2. Message CPI2283 is sent to the QSYSOPR message queue and the QSYSMSG
message queue (if it exists) every hour until auditing is successfully restarted.
3. Normal processing continues.
4. If an IPL is performed on the system, message CPI2284 is sent to the QSYSOPR
and QSYSMSG message queues during the IPL.
Note: In most cases, performing an IPL resolves the problem that caused
auditing to fail. After you have restarted your system, set the QAUDCTL
system value to the correct value. The system attempts to write an audit
journal record whenever this system value is changed.
You can set the QAUDENDACN to power down your system if auditing fails
(*PWRDWNSYS). Use this value only if your installation requires that auditing be
active for the system to run. If the system is unable to write an audit journal entry
and the QAUDENDACN system value is *PWRDWNSYS, the following happens:
1. The system powers down immediately (the equivalent of issuing the
PWRDWNSYS *IMMED command).
2. SRC code B900 3D10 is displayed.
Next, you must do the following:
1. Start an IPL from the system unit. Make sure that the device specified in the
system console (QCONSOLE) system value is powered on.
2. To complete the IPL, a user with *ALLOBJ and *AUDIT special authority must
sign on at the console.
3. The system starts in a restricted state with a message indicating that an
auditing error caused the system to stop.
4. The QAUDCTL system value is set to *NONE.
5. To restore the system to normal, set the QAUDCTL system value to a value
other than none. When you change the QAUDCTL system value, the system
attempts to write an audit journal entry. If it is successful, the system returns to
a normal state.
If the system does not successfully return to a normal state, use the job log to
determine why auditing has failed. Correct the problem and attempt to reset
the QAUDCTL value again.
266
267
Journal Entry:
CO (create object)
SV (system value change)
AD (object and user audit changes)
Notes: QSYS/QAUDJRN must exist before QAUDCTL can be
changed.
To set up security auditing, do the following steps. Setting up auditing requires
*AUDIT special authority.
1. Create a journal receiver in a library of your choice by using the Create Journal
Receiver (CRTJRNRCV) command. This example uses a library called JRNLIB
for journal receivers.
CRTJRNRCV
JRNRCV(JRNLIB/AUDRCV0001) +
THRESHOLD(100000) AUT(*EXCLUDE)
+
TEXT(Auditing Journal Receiver)
v Place the journal receiver in a library that is saved regularly. Do not place the
journal receiver in library QSYS, even though that is where the journal will
be.
v Choose a journal receiver name that can be used to create a naming
convention for future journal receivers, such as AUDRCV0001. You can use
the *GEN option when you change journal receivers to continue the naming
convention. Using this type of naming convention is also useful if you
choose to have the system manage changing your journal receivers.
v Specify a receiver threshold appropriate to your system size and activity. The
size you choose should be based on the number of transactions on your
system and the number of actions you choose to audit. If you use system
change-journal management support, the journal receiver threshold must be
at least 5,000KB. For more information on journal receiver threshold refer to
the Backup and Recovery book.
v Specify *EXCLUDE on the AUT parameter to limit access to the information
stored in the journal.
2. Create the QSYS/QAUDJRN journal by using the Create Journal (CRTJRN)
command:
CRTJRN
JRN(QSYS/QAUDJRN) +
JRNRCV(JRNLIB/AUDRCV0001) +
MNGRCV(*SYSTEM) DLTRCV(*NO) +
AUT(*EXCLUDE) TEXT(Auditing Journal)
268
3. Set the audit level (QAUDLVL) system value using the WRKSYSVAL
command. The QAUDLVL system value determines which actions are logged
to the audit journal for all users on the system. See Planning the Auditing of
Actions on page 253.
4. Set action auditing for individual users if necessary using the CHGUSRAUD
command. See Planning the Auditing of Actions on page 253.
5. Set object auditing for specific objects if necessary using the CHGOBJAUD and
CHGDLOAUD commands. See Planning the Auditing of Object Access on
page 263.
6. Set object auditing for specific users if necessary using the CHGUSRAUD
command.
7. Set the QAUDENDACN system value to control what happens if the system
cannot access the audit journal. See Audit End Action on page 266.
8. Set the QAUDFRCLVL system value to control how often audit records are
written to auxiliary storage. See Preventing Loss of Auditing Information on
page 265.
9. Start auditing by setting the QAUDCTL system value to a value other than
*NONE.
The QSYS/QAUDJRN journal must exist before you can change the QAUDCTL
system value to a value other than *NONE. When you start auditing, the system
attempts to write a record to the audit journal. If the attempt is not successful, you
receive a message and auditing does not start.
269
If damage occurs to the journal or to its current receiver so that the auditing
entries cannot be journaled, the QAUDENDACN system value determines what
action the system takes. Recovery from a damaged journal or journal receiver is the
same as for other journals.
You may want to have the system manage the changing of journal receivers.
Specify MNGRCV(*SYSTEM) when you create the QAUDJRN journal, or change
the journal to that value. If you specify MNGRCV(*SYSTEM), the system
automatically detaches the receiver when it reaches its threshold size and creates
and attaches a new journal receiver. This is called system change-journal
management.
If you specify MNGRCV(*USER) for the QAUDJRN, a message is sent to the
threshold message queue specified for the journal when the journal receiver
reaches a storage threshold. The message indicates that the receiver has reached its
threshold. Use the CHGJRN command to detach the receiver and attach a new
journal receiver. This prevents Entry not journaled error conditions. If you do
receive a message, you must use the CHGJRN command for security auditing to
continue.
The default message queue for a journal is QSYSOPR. If your installation has a
large volume of messages in the QSYSOPR message queue, you may want to
associate a different message queue, such as AUDMSG, with the QAUDJRN
journal. You can use a message handling program to monitor the AUDMSG
message queue. When a journal threshold warning is received (CPF7099), you can
automatically attach a new receiver. If you use system change-journal management,
then message CPF7020 is sent to the journal message queue when a system change
journal is completed. You can monitor for this message to know when to do a save
of the detached journal receivers.
Attention: The automatic cleanup function provided using Operational Assistant
menus does not clean up the QAUDJRN receivers. You should regularly detach,
save, and delete QAUDJRN receivers to avoid problems with disk space.
See the Backup and Recovery book for complete information about managing
journals and journal receivers.
Note: The QAUDJRN journal is created during an IPL if it does not exist and the
QAUDCTL system value is set to a value other than *NONE. This occurs
only after an unusual situation, such as replacing a disk device or clearing
an auxiliary storage pool.
270
Journal Entry:
J (system entry to QAUDJRN)
Notes: Select a time when the system is not busy.
You should regularly detach the current audit journal receiver and attach a new
one for two reasons:
v Analyzing journal entries is easier if each journal receiver contains the entries for
a specific, manageable time period.
v Large journal receivers can affect system performance, in addition to taking
valuable space on auxiliary storage.
Having the system manage receivers automatically is the recommended approach.
You can specify this by using the Manage receiver parameter when you create the
journal.
If you have set up action auditing and object auditing to log many different events,
you may need to specify a large threshold value for the journal receiver. If you are
managing receivers manually, you may need to change journal receivers daily. If
you log only a few events, you may want to change receivers to correspond with
the backup schedule for the library containing the journal receiver.
You use the CHGJRN command to detach a receiver and attach a new receiver.
System-Managed Journal Receivers: If you have the system manage the
receivers, use the following procedure to save all detached QAUDJRN receivers
and to delete them:
1. Type WRKJRNA QAUDJRN. The display shows you the currently attached receiver.
Do not save or delete this receiver.
2. Use F15 to work with the receiver directory. This shows all receivers that have
been associated with the journal and their status.
3. Use the SAVOBJ command to save each receiver, except the currently attached
receiver, which has not already been saved.
4. Use the DLTJRNRCV command to delete each receiver after it is saved.
Note: An alternative to the above procedure could be done using the journal
message queue and monitoring for the CPF7020 message which indicates
that the system change journal has completed successfully. See the Backup
and Recovery for more information on this support.
User-Managed Journal Receivers: If you choose to manage journal receivers
manually, use the following procedure to detach, save and delete a journal
receiver:
1. Type CHGJRN JRN(QAUDJRN) JRNRCV(*GEN). This command:
a. Detaches the currently attached receiver.
b. Creates a new receiver with the next sequential number.
c. Attaches the new receiver to the journal.
For example, if the current receiver is AUDRCV0003, the system creates and
attaches a new receiver called AUDRCV0004.
The Work with Journal Attributes (WRKJRNA) command tells you which
receiver is currently attached: WRKJRNA QAUDJRN.
271
2. Use the Save Object (SAVOBJ) command to save the detached journal receiver.
Specify object type *JRNRCV.
3. Use the Delete Journal Receiver (DLTJRNRCV) command to delete the receiver.
If you try to delete the receiver without saving it, you receive a warning
message.
272
select all entries in a specific range of dates, or you can select only a certain
type of entry, such as an incorrect sign-on attempt (journal entry type PW).
The default is to display entries from only the attached receiver. You can use
RCVRNG(*CURCHAIN) to see entries from all receivers that are in the receiver
chain for the QAUDJRN journal, up to and including the receiver that is
currently attached.
2. When you press the Enter key, you see the Display Journal Entries display:
QAUDJRN
Library . . . . . . :
QSYS
Sequence
28018
28020
28021
28022
28023
28024
28025
28026
28027
28028
28029
28030
F3=Exit
Code
J
T
T
T
T
T
T
T
T
T
T
T
Type
PR
AF
PW
AF
AF
AF
AF
PW
PW
PW
PW
PW
Object
Library
Job
JONES1
QSYSARB
QINTER
QSYSARB
QSYSARB
QSYSARB
QSYSARB
QINTER
SMITHJ
QINTER
QINTER
QINTER
Time
11:02:05
11:07:33
11:08:18
11:09:29
11:10:07
11:10:32
11:32:57
11:58:05
11:58:43
12:37:34
12:37:36
12:49:04
F12=Cancel
3. Use option 5 (Display entire entry) to see information about a specific entry:
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
:
:
:
:
QAUDJRN
Library . . . . . . :
Sequence . . . . . . :
T - Audit trail entry
PW - Invalid password or user ID
QSYS
28026
00051
Press Enter to continue.
F3=Exit
F6=Display only entry specific data
F10=Display only entry details
F12=Cancel
F24=More keys
4. You can use F6 (Display only entry specific data) for entries with a large
amount of entry-specific data. You can also select a hexadecimal version of that
display. You can use F10 to display details about the journal entry without any
entry-specific information.
Chapter 9. Auditing Security on the iSeries System
273
Appendix F contains the layout for each type of QAUDJRN journal entry.
. > *OUTFILE
. *TYPE4
. dspjrnout
.
mylib
.
.
*FIRST
*REPLACE
*OUTFILFMT
All security-related entries in the audit journal contain the same heading
information, such as the entry type, the date of the entry, and the job that caused
the entry. The QJORDJE4 record format is provided to define these fields when
you specify *TYPE4 as the outfile format parameter. See Table 142 on page 503 for
more information.
For more information on other records and their outfile formats see Appendix F.
If you want to perform a detailed analysis of a particular entry type, use one of the
model database outfiles provided. For example, to create an output file called
AUDJRNAF in QGPL that includes only authority failure entries:
1. Create an empty output file with the format defined for AF journal entries:
CRTDUPOBJ OBJ(QASYAFJ4) FROMLIB(QSYS) +
OBJTYPE(*FILE) TOLIB(QGPL) NEWOBJ(AUDJRNAF)
2. Use the DSPJRN command to write selected journal entries to the output file:
274
275
276
A journal entry cannot be altered by any user, even the security officer. A complete
journal or journal receiver can be deleted, but this is easily detected.
If you are journaling files and want to print all information about a particular file,
type the following:
DSPJRN JRN(library/journal) +
FILE(library/file) OUTPUT(*PRINT)
If you are journaling other object types and want to see the information for a
particular object, type the following:
DSPJRN JRN(library/journal)
OUTPUT(*OUTFILE)
OUTFILEFMT(*TYPE4)
OUTFILE(library/outfile)
ENTDTALEN(*CALC)
You can then do a query or use SQL to select all of the records from this outfile for
a specific object name.
If you want to find out which journals are on the system, use the Work with
Journals (WRKJRN) command. If you want to find out which objects are being
journaled by a particular journal, use the Work with Journal Attributes
(WRKJRNA) command.
The Backup and Recovery book provides complete information about journaling.
277
User
Profile
Password
Last
Changed
ANDERSOR
VINCENTM
08/04/0x
09/15/0x
Roger Anders
Mark Vincent
ANDERSOR
WAGNERR
08/04/0x
09/06/0x
Roger Anders
Rose Wagner
JONESS
HARRISOK
09/20/0x
08/29/0x
Sharon Jones
Ken Harrison
DPTSM
DPTWH
RICHARDS
SMITHJ
09/05/0x
08/13/0x
09/05/0x
09/18/0x
No
Password
X
X
Text
You can use a query tool to create a variety of analysis reports of your output file,
such as:
v A list of all users who have both *ALLOBJ and *SPLCTL special authority.
v A list of all users sequenced by a user profile field, such as initial program or
user class.
You can create query programs to produce different reports from your output file.
For example:
v List all user profiles that have any special authorities by selecting records where
the field UPSPAU is not equal to *NONE.
v List all users who are allowed to enter commands by selecting records where the
Limit capabilities field (called UPLTCP in the model database outfile) is equal to
*NO or *PARTIAL.
v List all users who have a particular initial menu or initial program.
v List inactive users by looking at the date last sign-on field.
v List all users who do not have a password for use at password levels 0 and 1 by
selecting records where the Password present for level 0 or 1 field (called
UPENPW in the model outfile) is equal to N.
v List all users who have a password for use at password levels 2 and 3 by
selecting records where the Password present for level 2 or 3 field (called
UPENPH in the model outfile) is equal to Y.
278
2. Create a query program to list the name and size of each user profile, in
descending sequence by size.
3. Print detailed information about the largest user profiles and evaluate the
authorities and owned objects to see if they are appropriate:
DSPUSRPRF USRPRF(user-profile-name) +
TYPE(*OBJAUT) OUTPUT(*PRINT)
DSPUSRPRF USRPRF(user-profile-name) +
TYPE(*OBJOWN) OUTPUT(*PRINT)
Some IBM-supplied user profiles are very large because of the number of
objects they own. Listing and analyzing them is usually not necessary.
However, you should check for programs adopting the authority of the
IBM-supplied user profiles that have *ALLOBJ special authority, such as
QSECOFR and QSYS. See Analyzing Programs That Adopt Authority.
Appendix B provides information about all the IBM-supplied user profiles and
their functions.
3. Use the Display Library (DSPLIB) command to list the objects in the library:
|
|
Using these reports, you can determine what is in a library and who has access to
the library. If necessary, you can use the DSPOBJAUT command to view the
authority for selected objects in the library also.
Note: The topic Printing Selected User Profiles on page 278 shows how to list
users with *ALLOBJ authority.
2. Use the DSPOBJAUT command to determine who is authorized to use each
adopting program and what the public authority is to the program:
279
DSPOBJAUT OBJ(library-name/program-name) +
OBJTYPE(*PGM) ASPDEV(asp-device-name) OUTPUT(*PRINT)
|
|
|
|
When you run the command, the system creates a database file containing
information about any potential integrity problems. You can check objects owned
by one or more profiles, objects that match a path name, or all objects on the
system. You can look for objects whose domain has been altered and objects that
have been tampered with. You can recalculate program validation values to look
for objects of type *PGM, *SRVPGM, *MODULE, and *SQLPKG that have been
altered. You can check the signature of objects that can be digitally signed. You can
also check if libraries and commands have been tampered with.
|
|
|
|
|
|
280
Note: Table 116 on page 254 shows all the possible values for action auditing.
2. Remove the *AUDIT special authority from user profiles with *ALLOBJ and
*SECADM special authority. This prevents these users from changing the
auditing characteristics of their own profiles.
Note: You cannot remove special authorities from the QSECOFR profile.
Therefore, you cannot prevent a user signed on as QSECOFR from
changing the auditing characteristics of that profile. However, if a user
signed on as QSECOFR uses the CHGUSRAUD command to change
auditing characteristics, an AD entry type is written to the audit journal.
It is recommended that security officers (users with *ALLOBJ or *SECADM
special authority) use their own profiles for better auditing. The password for
the QSECOFR profile should not be distributed.
3. Make sure the QAUDCTL system value includes *AUDLVL.
4. Use the DSPJRN command to review the entries in the audit journal using the
techniques described in Analyzing Audit Journal Entries with Query or a
Program on page 274.
281
282
Descriptive Name
Function
CRTAUTHLR
DLTAUTHLR
DSPAUTHLR
Descriptive Name
Function
ADDAUTLE
CHGAUTLE
CRTAUTL
DLTAUTL
DSPAUTL
DSPAUTLOBJ
EDTAUTL
RMVAUTLE
RTVAUTLE
WRKAUTL
283
Table 121. Commands for Working with Object Authority and Auditing
Command Name
Descriptive Name
CHGAUD
CHGAUT
CHGOBJAUD
Change Auditing
Change Authority
Change Object Auditing
CHGOBJOWN
CHGOBJPGP
CHGOWN
CHGPGP
DSPAUT
DSPOBJAUT
DSPOBJD
EDTOBJAUT
GRTOBJAUT
RVKOBJAUT
WRKAUT
WRKOBJ
WRKOBJOWN
WRKOBJPGP
284
Function
|
|
|
|
|
|
Command Name
Descriptive Name
Function
CHGDSTPWD
CHGPWD
CHGUSRPRF
CHKPWD
Check Password
CRTUSRPRF1
When a CRTUSRPRF is done, you cant specify that the *USRPRF is to be created into an IASP. However,
when a user is privately authorized to an object on and IASP, is the owner of an object on an IASP, or is the
primary group of an object on an IASP, the profiles name is stored on the IASP. If the IASP is moved to
another system, the private authority, object ownership, and primary group entries will be attached to the
profile with the same name on the target system. If a profile does not exist on the target system, a profile
will be created. The user will not have any special authorities and the password will be set to *NONE.
285
Descriptive Name
Function
CHGPRF
Change Profile
CHGUSRAUD
CHGUSRPRF
CHKOBJITG
CRTUSRPRF
DLTUSRPRF
DSPAUTUSR
DSPUSRPRF
GRTUSRAUT
PRTPRFINT
PRTUSRPRF
RTVUSRPRF
WRKUSRPRF
286
Descriptive Name
Function
DSPPGMADP
RSTAUT
Restore Authority
RSTUSRPRF
SAVSECDTA
SAVSYS
Save System
Descriptive Name
Function
CHGAUD
CHGDLOAUD
Change Auditing
Change Document Library Object
Auditing
Change Object Auditing
Change User Audit
CHGOBJAUD
CHGUSRAUD
Descriptive Name
ADDDLOAUT
CHGDLOAUD
CHGDLOAUT
CHGDLOOWN
CHGDLOPGP
DSPAUTLDLO
DSPDLOAUD
DSPDLOAUT
EDTDLOAUT
Function
287
Table 126. Commands for Working with Document Library Objects (continued).
Command Name
Descriptive Name
Function
GRTUSRPMN
RMVDLOAUT
RVKUSRPMN
Descriptive Name
ADDSVRAUTE
CHGSVRAUTE
| DSPSVRAUTE
RMVSVRAUTE
Function
These commands allow a user to specify a user name, the associated password, and the name of a remote
server machine. Distributed Relational Database Access (DRDA) uses these entries to run database access
requests as the specified user on the remote server.
Table 128. Commands for Working with the System Distribution Directory
Command Name
Descriptive Name
Function
ADDDIRE
CHGDIRE
RMVDIRE
WRKDIRE
288
Descriptive Name
Function
CRTVLDL
DLTVLDL
The following tables describe several different kinds of security tools. For more
information on the security tools, see Appendix G, Commands and Menus for
Security Commands.
Table 130. Security Tools for Working with Auditing
Command Name
Descriptive Name
Function
CHGSECAUD
DSPAUDJRNE
DSPSECAUD
Descriptive Name
Function
PRTJOBDAUT
PRTPUBAUT
PRTPVTAUT
PRTQAUT
PRTSBSDAUT
PRTTRGPGM
PRTUSROBJ
289
Descriptive Name
Function
| CHGSECA 1
|
|
|
| CFGSYSSEC
|
|
| CLRSVRSEC
|
|
|
|
|
| DSPSECA
|
| PRTCMNSEC
|
| PRTSYSSECA
|
|
| RVKPUBAUT
|
|
|
For more information on tools and suggestions about how to use the security tools,
see the Tips for Making Your iSeries 400 Secure book, GC41-0615.
290
IBM-Supplied User
Profiles
Password (PASSWORD)
Set password to expired (PWDEXP)
Status (STATUS)
User class (USRCLS)
Assistance level (ASTLVL)
Current library (CURLIB)
Initial program (INLPGM)
Initial menu (INLMNU)
Initial menu library
Limited capabilities (LMTCPB)
Text (TEXT)
Special authority (SPCAUT)
Special environment (SPCENV)
Display sign-on information (DSPSGNINF)
*NONE
*NO
*ENABLED
*USER
*SYSVAL
*CRTDFT
*NONE
MAIN
*LIBL
*NO
*BLANK
*ALLOBJ1 *SAVSYS1
*SYSVAL
*SYSVAL
*USRPRF4
*NO
*ENABLED
*USER
*SYSVAL
*CRTDFT
*NONE
MAIN
*LIBL
*NO
*BLANK
*USRCLS2
*SYSVAL
*SYSVAL
291
|
|
|
|
|
|
|
|
|
|
292
IBM-Supplied User
Profiles
*SYSVAL
*SYSVAL
*SYSVAL
*NOMAX
0
QDFTJOBD
QGPL
*NONE
*USRPRF
*NONE
*PRIVATE
*NONE
*SYS
*NONE
*USRPRF
*NOTIFY
00
*WRKSTN
*WRKSTN
*NONE
*SYSVAL
*SYSVAL
*SYSVAL
*SYSVAL
*SYSVAL
*NONE
*NONE
*GEN
*NONE
*USRPRF
*EXCLUDE
*NONE
*NONE
*SYSVAL
*SYSVAL
*SYSVAL
*NOMAX
3
QDFTJOBD
*LIBL
*NONE
*USRPRF
*NONE
*PRIVATE
*NONE
*BLANK
*NONE
*USRPRF
*NOTIFY
00
*WRKSTN
*WRKSTN
*SYSVAL
*SYSVAL
*SYSVAL
*SYSVAL
*SYSVAL
*SYSVAL
*SYSVAL
*NONE
*GEN
*NONE
*USRPRF
*EXCLUDE
*NONE
*NONE
When the system security level is changed from level 10 or 20 to level 30 or above,
this value is removed.
When a user profile is automatically created at security level 10, the *USER user
class gives *ALLOBJ and *SAVSYS special authority.
Action and object auditing are specified using the CHGUSRAUD command.
When you perform a CRTUSRPRF, you can not create a user profile (*USRPRF) into
an independent disk pool. However, when a user is privately authorized to an
object in the independent disk pool, is the owner of an object on an independent
disk pool, or is the primary group of an object on an independent disk pool, the
name of the profile is stored on the independent disk pool. If the independent disk
pool is moved to another system, the private authority, object ownership, and
primary group entries will be attached to the profile with the same name on the
target system. If a profile does not exist on the target system, a profile will be
created. The user will not have any special authorities and the password will be set
to *NONE.
Descriptive Name
QADSM
v USERCLS: *SYSOPR
v CURLIB: QADSM
v TEXT: ADSM profile used by ADSM server
v SPCAUT: *JOBCTL, *SAVSYS
v JOBD: QADSM/QADSM
v OUTQ: QADSM/QADSM
QAFOWN
v USRCLS: *PGMR
v SPCAUT: *JOBCTL
v JOBD: QADSM/QADSM
v TEXT: Internal APD User Profile
QAFUSR
QAFDFTUSR
v INLPGM: *LIBL/QAFINLPG
v LMTCPB: *YES
v TEXT: Internal APD User Profile
QAUTPROF
QBRMS
QCLUMGT
Cluster management
profile
v STATUS: *DISABLED
v MSGQ: *NONE
v ATNPGM: *NONE
QCLUSTER
High availability
cluster profile
QCOLSRV
Management central
collection services user
profile
QDBSHR
QDBSHRDO
QDCEADM
v PASSWORD: *USRPRF
v SPCAUT: *IOSYSCFG
v PWDEXP: *YES
v STATUS: *DISABLED
v TEXT: *NONE
v SPCAUT: *JOBCTL
QDFTOWN
v PTYLMT: 3
v ACGCDE: *BLANK
QDIRSRV
OS/400 Directory
services server user
profile
v LMTCPB: *YES
v JOBD: QGPL/QBATCH
v DSPSGNINF: *NO
v LMTDEVSSN: *NO
v DLVRY: *HOLD
v SPCENV: *NONE
v ATNPGM: *NONE
293
Descriptive Name
QDLFM
QDOC
Document profile
v ACGCDE: *BLANK
v AUT: *CHANGE
QDSNX
Distributed systems
node executive profile
v PTYLMT: 3
v CCSID: *HEX
v ACGCDE: *BLANK
v SRTSEQ: *HEX
QEJB
QFNC
Finance profile
v PTYLMT: 3
QGATE
VM/MVS* bridge
profile
v CCSID: *HEX
QIPP
Internet printing
profile
v MSGQ: QUSRSYS/QIPP
QLPAUTO
Licensed program
automatic install
profile
v USRCLS: *SYSOPR
v SRTSEQ: *HEX
v INLMNU: *SIGNOFF
v SPCAUT: *ALLOBJ, *JOBCTL ,*SAVSYS, *SECADM, *IOSYSCFG
v INLPGM: QLPINATO
v Library: QSYS
v DLVRY: *HOLD
v SEV: 99
QLPINSTALL
Licensed program
install profile
v USRCLS: *SYSOPR
v DLVRY: *HOLD
v SPCAUT: *ALLOBJ, *JOBCTL, *SAVSYS, *SECADM, *IOSYSCFG
QMSF
QMQM
QNFSANON
QNETSPLF
Network spooling
profile
QNETWARE
v STATUS: *DISABLED
v TEXT: QFPNTWE USER PROFILE
QNTP
v JOBD: QTOTNTP
v JOBD LIBRARY: QSYS
294
Descriptive Name
QOIUSER
OSI Communication
Subsystem
v USRCLS: *SYSOPR
v SPCAUT: *JOBCTL, *SAVSYS, *IOSYSCFG
v CURLIB: QOSI
v MSGQ: QOSI/QOIUSER
v DLVRY: *HOLD
v OUTQ: *DEV
v PRTDEV: *SYSVAL
v ATNPGM: *NONE
v CCSID: *HEX
v TEXT: Internal OSI Communication Subsystem User Profile
QOSIFS
v USRCLS: *SYSOPR
v SPCAUT: *JOBCTL, *SAVSYS
v OUTQ: *DEV
v CURLIB: *QOSIFS
v CCSID: *HEX
v TEXT: Internal OSI File Services User Profile
QPGMR
Programmer profile
v USRCLS: *PGMR
v SPCAUT: *ALLOBJ
*SAVSYS *JOBCTL
v PTYLMT: 3
v ACGCDE: *BLANK
| QPEX
Performance Explorer
user profile
v PTYLMT: 3
v ATNPGM: *SYSVAL
v TEXT: IBM-supplied User Profile
v ACGCDE: *BLANK
QPM400
Performance
Management/400
(PM/400)
QPRJOWN
v STATUS: *DISABLED
v CURLIB: QADM
v TEXT: User profile of parts and projects owner
QRDARSADM
v INLMNU: *SIGNOFF
v TEXT: R/DARS Administration Profile
QRDAR
R/DARS owning
profile
v USRCLS: *PGMR
v INLMNU: *SIGNOFF
v OUTQ: *DEV
v TEXT: R/DARS-400 owning profile
QRDARS4001
R/DARS owning
profile 1
v INLMNU: *SIGNOFF
v GRPPRF: QRDARS400
v OUTQ: *DEV
v TEXT: R/DARS-400 owning profile 1
295
Descriptive Name
QRDARS4002
R/DARS owning
profile 2
v INLMNU: *SIGNOFF
v GRPPRF: QRDARS400
v OUTQ: *DEV
v TEXT: R/DARS-400 owning profile 2
QRDARS4003
R/DARS owning
profile 3
v INLMNU: *SIGNOFF
v GRPPRF: QRDARS400
v OUTQ: *DEV
v TEXT: R/DARS-400 owning profile 3
QRDARS4004
R/DARS owning
profile 4
v INLMNU: *SIGNOFF
v GRPPRF: QRDARS400
v OUTQ: *DEV
v TEXT: R/DARS-400 owning profile 4
QRDARS4005
R/DARS owning
profile 5
v INLMNU: *SIGNOFF
v GRPPRF: QRDARS400
v OUTQ: *DEV
v TEXT: R/DARS-400 owning profile 5
QRMTCAL
QRJE
v USRCLS: *PGMR
v PWDEXP: *YES
QSECOFR
SPCAUT: *ALLOBJ
*SAVSYS
*JOBCTL
v USRCLS: *SECOFR
v SPCAUT: *ALLOBJ, *SAVSYS, *JOBCTL, *SECADM, *SPLCTL,
*SERVICE, *AUDIT, *IOSYSCFG
v ACGCDE: *BLANK
v UID: 0
v PASSWORD: QSECOFR
QSNADS
QSOC
SNA distribution
services profile
v CCSID: *HEX
OptiConnect user
profile
v USRCLS: *SYSOPR
v SRTSEQ: *HEX
v CURLIB: *QSOC
v SPCAUT: *JOBCTL
v MSGQ: QUSRSYS/QSOC
QSPL
Spool profile
QSPLJOB
v AUT: *USE
QSRV
Service profile
v USRCLS: *PGMR
v SPCAUT: *ALLOBJ 1, *SAVSYS 1, *JOBCTL, *SERVICE
v ASTLVL: *INTERMED
v ATNPGM: QSCATTN
v Library: QSYS
296
Descriptive Name
QSRVBAS
v USRCLS: *PGMR
v
SPCAUT: *ALLOBJ
*SAVSYS
*JOBCTL
v ASTLVL: *INTERMED
v ATNPGM: QSCATTN
v Library: QSYS
QSVCCS
QSVCM
Client Management
Server user profile
QSVSM
v USRCLS: *SYSOPR
v STATUS: *DISABLED
v SPCAUT: *JOBCTL
v SPCENV: *SYSVAL
v TEXT: SystemView System Manager User Profile
QSVSMSS
Managed System
Service user profile
v STATUS: *DISABLED
v USRCLS: *SYSOPR
v SPCAUT: *JOBCTL
v SPCENV: *SYSVAL
v TEXT: Managed System Service User Profile
QSYS
System profile
v USRCLS: *SECOFR
v SPCAUT: *ALLOBJ, *SECADM, *SAVSYS, *JOBCTL, *AUDIT,
*SPLCTL, *SERVICE, *IOSYSCFG
QSYSOPR
System operator
profile
v USRCLS: *SYSOPR
v SPCAUT: *ALLOBJ 1, *SAVSYS, *JOBCTL
v INLMNU: SYSTEM
v LIBRARY: *LIBL
v MSGQ: QSYSOPR
v DLVRY: *BREAK
v SEV: 40
v ACGCDE: *BLANK
QTCM
Triggered cache
manager profile
v STATUS: *DISABLED
QTCP
Transmission control
protocol (TCP) profile
v USRCLS: *SYSOPR
v SPCAUT: *JOBCTL
v CCSID: *HEX
v SRTSEQ: *HEX
QTFTP
297
Descriptive Name
QTMPLPD
Transmission control
protocol/Internet
protocol (TCP/IP)
printing support
profile
v PTYLMT: 3
v JOBD: QGPL/QDFTJOBD
QTMPLPD
v AUT: *USE
v PWDEXPITV: *NOMAX
v MSGQ: QTCP/QTMPLPD
QTMTWSG
QTMHHTTP
QTMHHTP1
HTML Workstation
Gateway Profile user
profile
v MSGQ: QUSRSYS/QTMTWSG
HTML Workstation
Gateway Profile user
profile
v MSGQ: QUSRSYS/QTMHHTTP
HTML Workstation
Gateway Profile user
profile
v MSGQ: QUSRSYS/QTMHHTTP
QTSTRQS
QUMB
Ultimedia System
Facilities user profile
QUMVUSER
Ultimedia Business
Conferencing user
profile
QUSER
Workstation user
profile
v PTYLMT: 3
v DLVRY: *HOLD
v OUTQ: *DEV
v PRTDEV: *SYSVAL
v ATNPGM: *NONE
v CCSID: *HEX
v TEXT: Internal OSI Messages Services User Profile
QYPSJSVR
Management Central
Java Server profile
QYPUOWN
298
When the system security level is changed from level 10 or 20 to level 30 or above, this value is removed.
|
|
|
|
|
|
|
|
|
|
|
|
In Table 135, commands that are restricted to the security officer, and any user
profile with *ALLOBJ authority, have an R in the QSECOFR profile. Commands
that are specifically authorized to one or more IBM-supplied user profiles, in
addition to the security officer, have an S under the profile names for which they
are authorized).
|
|
|
|
Any commands not listed here are public, which means they can be used by all
users. However, some commands require special authority, such as *SERVICE or
*JOBCTL. The special authorities required for a command are listed in Appendix D,
Authority Required for Objects Used by Commands on page 309
|
|
|
|
|
|
If you choose to grant other users or the public *USE authority to these commands,
update this table to indicate that commands are no longer restricted on your
system. Using some commands may require the authority to certain objects on the
system as well as to the commands themselves. See Appendix D, Authority
Required for Objects Used by Commands on page 309 for the object authorities
required for commands.
QSECOFR
| ADDCMDCRQA
QPGMR
QSYSOPR
| ADDDSTQ
| ADDDSTRTE
| ADDDSTSYSN
| ADDCRSDMNK
QSRV
QSRVBAS
S
| ADDEXITPGM
| ADDMFS
| ADDNETJOBE
| ADDOBJCRQA
| ADDOPTCTG
| ADDOPTSVR
| ADDPEXDFN
| ADDPEXFTR
| ADDPRDCRQA
| ADDPTFCRQA
| ADDRPYLE
| ADDRSCCRQA
299
QSECOFR
| ANSQST
| ANZACCGRP
| ANZBESTMDL
| ANZDBF
| ANZDBFKEY
| ANZDFTPWD
| ANZPFRDTA
| ANZPGM
| ANZPRB
QPGMR
| ANZPRFACT
| ANZS34OCL
| ANZS36OCL
| APYJRNCHG
QSYSOPR
QSRV
QSRVBAS
| APYPTF
| APYRMTPTF
| CFGDSTSRV
| CFGRPDS
| CHGDSTQ
| CHGDSTRTE
| CHGMGDSYSA
| CHGMGRSRVA
| CFGSYSSEC
| CHGACTSCDE
| CHGCMDCRQA
| CHGCRSDMNK
| CHGDSTPWD
| CHGFCNARA
| CHGGPHFMT
| CHGGPHPKG
| CHGJOBTRC
| CHGJOBTYP
| CHGJRN
| CHGMSTK
| CHGNETA
| CHGNETJOBE
| CHGNFSEXP
| CHGNWSA
300
| CHGEXPSCDE
| CHGLICINF
QSECOFR
| CHGOBJCRQA
| CHGOPTA
QPGMR
S
QSYSOPR
S
QSRV
QSRVBAS
S
| CHGPEXDFN
| CHGPRB
| CHGPRDCRQA
| CHGPTFCRQA
| CHGPTR
| CHGQSTDB
S
R
| CHGRCYAP
| CHGRPYLE
| CHGRSCCRQA
| CHGSYSLIBL
| CHGSYSVAL
| CHGS34LIBM
| CHKCMNTRC
| CHKPRDOPT
| CPYPTF
| CPYPTFGRP
| CPHDTA
| CPYFCNARA
| CPYGPHFMT
| CPYGPHPKG
| CPYPFRDTA
| CRTAUTHLR
| CRTBESTMDL
| CRTCLS
| CRTFCNARA
| CRTGPHFMT
| CRTGPHPKG
| CRTHSTDTA
| CRTJOBD
| CRTPFRDTA
| CRTLASREP
| CRTPEXDT
| CRTQSTDB
| CRTQSTLOD
| CRTSBSD
| CRTUDFS
| CRTUDFS
301
QSECOFR
| CRTVLDL
| CVTBASSTR
| CVTBASUNF
| CVTBGUDTA
| CVTPFRDTA
| CVTPFRTHD
| CVTS36CFG
| CVTS36FCT
| CVTS36JOB
| CVTS36QRY
| CVTS38JOB
QPGMR
QSYSOPR
QSRV
QSRVBAS
| CVTTCPCL
| DLTAPARDTA
| DLTBESTMDL
| DLTCMNTRC
| DLTFCNARA
| DLTGPHFMT
| DLTGPHPKG
| DLTHSTDTA
| DLTLICPGM
| DLTPEXDTA
| DLTPFRDTA
| DLTPRB
| DLTPTF
| DLTRMTPTF
| DLTSMGOBJ
| DMPDLO
| DMPJOB
| DMPJOBINT
| DLTQST
| DLTQSTDB
| DLTUDFS
| DLTVLDL
| DMPOBJ
| DMPSYSOBJ
| DMPTRC
| DSPACCGRP
| DSPAUDJRNE
| DSPDSTLOG
302
QSECOFR
| DSPHSTGPH
| DSPMFSINF
| DSPMGDSYSA
QPGMR
QSYSOPR
QSRV
QSRVBAS
| DSPPTF
| DSPSRVSTS
| DSPPFRDTA
| DSPPFRGPH
| DSPUDFS
| EDTCPCST
| EDTQST
S
R
| EDTRBDAP
| EDTRCYAP
| ENCCPHK
| ENCFRMMSTK
| ENCTOMSTK
| ENDCHTSVR
| ENDCMNTRC
| ENDDBGSVR
| ENDHOSTSVR
| ENDIPSIFC
| ENDJOBABN
| ENDMGDSYS
| ENDMGRSRV
| ENDIDXMON
| ENDJOBTRC
| ENDMSF
| ENDNFSSVR
| ENDPEX
| ENDPFRTRC
| ENDSRVJOB
| ENDSYSMGR
| ENDTCP
| ENDTCPCNN
| ENDTCPIFC
| ENDTCPSVR
| GENCPHK
| GENCRSDMNK
| GENMAC
| GENPIN
303
QSECOFR
| GENS36RPT
| GENS38RPT
| GRTACCAUT
QPGMR
QSYSOPR
| HLDCMNDEV
| HLDDSTQ
| INSPTF
| INZDSTQ
| LODQSTDB
| MGRS36
| MGRS36APF
| MGRS36CBL
| MGRS36DFU
| MGRS36DSPF
| MGRS36ITM
| MGRS36LIB
| MGRS36MNU
| MGRS36MSGF
| MGRS36QRY
| MGRS36RPG
| MGRS36SEC
| MGRS38OBJ
| MIGRATE
| PKGPRDDST
| PRTACTRPT
| PRTADPOBJ
| PRTCMNSEC
| PRTCMNTRC
| PRTCPTRPT
| PRTJOBRPT
| PRTJOBTRC
| PRTLCKRPT
| PRTPOLRPT
| PRTRSCRPT
| PRTSYSRPT
| PRTTNSRPT
| PRTTRCRPT
| LODPTF
304
QSRVBAS
| INSRMTPRD
| INZSYS
QSRV
QSECOFR
QPGMR
QSYSOPR
QSRV
QSRVBAS
| PRTERRLOG
| PRTINTDTA
| PRTJOBDAUT
| PRTPRFINT
| PRTPVTAUT
| PRTQAUT
| PRTSBSDAUT
| PRTSYSSECA
| PRTTRGPGM
| PRTUSRPRF
| PRTUSROBJ
| PWRDWNSYS
| RCLOPT
| RCLSPLSTG
| RCLSTG
| RCLTMPSTG
| RLSCMNDEV
| RLSDSTQ
| RMVDSTQ
| RMVDSTRTE
| RMVDSTSYSN
| RESMGRNAM
| RLSIFSLCK
| RLSRMTPHS
| RMVACC
| RMVCRSDMNK
| RMVEXITPGM
| RMVJRNCHG
| RMVPEXDFN
| RMVPEXFTR
| RMVLANADP
| RMVMFS
| RMVNETJOBE
| RMVOPTCTG
| RMVOPTSVR
| RMVPTF
| RMVRMTPTF
| RMVRPYLE
| RSTAUT
R
Appendix C. Commands Shipped with Public Authority *EXCLUDE
305
QSECOFR
QPGMR
QSYSOPR
QSRV
QSRVBAS
| RSTCFG
| RSTDLO
| RSTLIB
| RSTLICPGM
| RSTOBJ
| RSTS36F
| RSTS36FLR
| RSTS36LIBM
| RSTS38AUT
| RSTUSFCNR
R
5
| RSTUSRPRF
| RTVDSKINF
| RTVPRD
| RTVPTF
| RTVSMGOBJ
| RUNLPDA
| RUNSMGCMD
| RUNSMGOBJ
| SNDDSTQ
| SNDPRD
| SNDPTF
| RVKPUBAUT
| SAVAPARDTA
| SAVLICPGM
| SBMFNCJOB
| SBMNWSCMD
| SETMSTK
| SNDPTFORD
| SNDSMGOBJ
| SNDSRVRQS
| STRBEST
| STRCHTSVR
| STRCMNTRC
| STRDBG
| STRDBGSVR
| STRHOSTSVR
| STRIDXMON
306
| STRIPSIFC
| STRJOBTRC
QSECOFR
QPGMR
QSYSOPR
QSRV
QSRVBAS
| STRMGDSYS
| STRMGRSRV
| STRMSF
| STRNFSSVR
| STRPEX
| STRPFRG
| STRPFRT
| STRPFRTRC
| STRRGZIDX
| STRSRVJOB
| STRSST
| STRSYSMGR
| STRTCP
| STRTCPIFC
| STRTCPSVR
| STRS36MGR
| STRS38MGR
| STRUPDIDX
| TRCCPIC
| TRCICF
| TRCINT
| TRCJOB
| VFYCMN
| VFYLNKLPDA
| VFYPRT
| VFYTAP
| TRNPIN
| VFYMSTK
| VFYPIN
| WRKCNTINF
| WRKDEVTBL
| WRKDPCQ
| WRKDSTQ
| WRKFCNARA
| WRKJRN
| WRKLICINF
| WRKORDINF
| WRKPEXDFN
| WRKPEXFTR
| WRKPGMTBL
R
Appendix C. Commands Shipped with Public Authority *EXCLUDE
307
QSECOFR
QPGMR
QSYSOPR
QSRV
QSRVBAS
| WRKPRB
| WRKPTFGRP
| WRKSRVPVD
| WRKSYSACT
| WRKTXTIDX
| WRKUSRTBL
|
|
The CHGDSTPWD command is shipped with public authority *USE, but you must be signed on as
QSECOFR to use this command.
QSRV can only run this command if an IPL is not being done.
| 5
|
308
|
|
|
|
|
|
|
The tables in this appendix show what authority is needed for objects referenced
by commands. For example, in the entry for the Change User Profile
(CHGUSRPRF) command in User Profile Commands on page 436, the table lists
all the objects you need authority to, such as the users message queue, job
description, and initial program.
|
|
|
|
|
The tables are organized in alphabetical order according to object type. In addition,
tables are included for items that are not OS/400 objects (jobs, spooled files,
network attributes, and system values) and for some functions (device emulation
and finance). Additional considerations (if any) for the commands are included as
footnotes to the table.
|
|
|
Referenced Object: The objects listed in the Referenced Object column are objects to
which the user needs authority when using the command. See Assumptions on
page 311 for information about objects which are not listed for each command.
|
|
|
|
|
|
Authority Needed for Object: The authorities specified in the tables show the
object authorities and the data authorities required for the object when using the
command. Table 136 describes the authorities that are specified in the Authority
Needed column. The description includes examples of how the authority is used. In
most cases, accessing an object requires a combination of object and data
authorities.
|
|
|
|
|
Authority Needed for Library: This column shows what authority is needed for
the library containing the object. For most operations, *EXECUTE authority is
needed to locate the object in the library. Adding an object to a library usually
requires *READ and *ADD authority. Table 136 describes the authorities that are
specified in the Authority Needed column.
Authority
Name
Functions Allowed
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Object Authorities:
*OBJOPR
Object Operational
*OBJMGT
Object Management
*OBJEXIST
Object Existence
*OBJALTER
Object Alter
309
Authority
Name
Functions Allowed
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
*OBJREF
Object Reference
*AUTLMGT
Authorization List
Management
Data Authorities:
*READ
Read
*ADD
Add
*UPD
Update
*DLT
Delete
*EXECUTE
Execute
|
|
If a user has save system (*SAVSYS) special authority, object existence authority is
not required to perform save and restore operations on the object.
|
|
See the topic Authorization List Management on page 127 for more information.
|
|
|
In addition to these values, the Authority Needed columns of the table may show
system-defined subsets of these authorities. Table 137 shows the subsets of object
authorities and data authorities.
Authority
|
|
|
|
|
|
|
|
|
|
|
|
|
Object Authorities
*OBJOPR
*OBJMGT
*OBJEXIST
*OBJALTER
*OBJREF
Data Authorities
*READ
*ADD
*UPD
*DLT
*EXECUTE
|
|
Table 138 on page 311 shows additional authority subsets that are supported by the
CHGAUT and WRKAUT commands.
310
*ALL
*CHANGE
*USE
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
*EXCLUDE
Authority
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Object
Authorities
*OBJOPR
*OBJMGT
*OBJEXIST
*OBJALTER
*OBJREF
Data
Authorities
*READ
*ADD
*UPD
*DLT
*EXECUTE
|
|
For more information on these authorities and their descriptions, see Defining
How Information Can Be Accessed on page 120.
|
|
*RWX
*RW
*RX
*R
*WX
*W
*X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X
Assumptions
|
|
|
|
|
|
|
|
||
Authority Needed
Command
Referenced Object
For Object
|
|
|
|
Current values
|
|
Command accessing
object in directory
*R
|
|
*X
|
|
None
|
|
*R
For Library
311
Authority Needed
Command
Referenced Object
For Object
For Library
|
|
|
|
|
Object to be copied
*OBJOPR, *READ
*EXECUTE
*OBJOPR
*EXECUTE
*ADD, *EXECUTE
|
|
*ADD, *EXECUTE
|
|
*OBJOPR, *ADD
*EXECUTE
|
|
*OBJOPR, *OBJMGT,
*ADD, *DLT
*EXECUTE
|
|
*OBJOPR, *OBJMGT,
*ADD, *UPD
*EXECUTE
|
|
*OBJOPR, *ADD,
*UPD
*EXECUTE
Create (CRT)
|
|
|
Object to be created2
*READ, *ADD
*ADD
*ADD
|
|
|
|
|
|
Create (CRT) if
REPLACE(*YES) is
specified 6, 9
|
|
|
|
|
|
|
Display (DSP) or
Object to be displayed
*USE
other operation using
3
Output file, if file does not exist
output file
(OUTPUT(*OUTFILE)) Output file, if file exists and new member is *OBJOPR, *OBJMGT,
added, or if *REPLACE option specified and *ADD, *DLT
member did not previously exist
*EXECUTE
*ADD, *EXECUTE
*ADD, *EXECUTE
|
|
*OBJOPR, *ADD
*EXECUTE
|
|
*OBJOPR, *OBJMGT,
*ADD, *DLT
*EXECUTE
|
|
*OBJOPR, *READ
Object to be displayed
*USE
*EXECUTE
*READ
*EXECUTE
*USE
*EXECUTE
Device description
*USE
*EXECUTE
*EXECUTE
|
|
|
|
|
|
|
|
|
|
|
312
Output queue
Authority Needed
Command
|
|
|
|
|
|
The user profile running the copy command becomes the owner of the to-file, unless the user is a member
of a group profile and has OWNER(*GRPPRF). If the users profile specifies OWNER(*GRPPRF), the group
profile becomes the owner of the to-file. In that case, the user running the command must have *ADD
authority to the group profile and the authority to add a member and write data to the new file. The to-file
is given the same public authority, primary group authority, private authorities, and authorization list as
the from-file.
|
|
|
|
The user profile running the create command becomes the owner of the newly created object, unless the
user is a member of a group profile and has OWNER(*GRPPRF). If the users profile specifies
OWNER(*GRPPRF), the group profile becomes the owner of the newly created object. Public authority to
the object is controlled by the AUT parameter.
|
|
|
|
The user profile running the display command becomes the owner of the newly created output file, unless
the user is a member of a group profile and has OWNER(*GRPPRF). If the users profile specifies
OWNER(*GRPPRF), the group profile becomes the owner of the output file. Public authority to the output
file is controlled by the CRTAUT parameter of the output file library.
|
|
|
If the output queue is defined as OPRCTL (*YES), a user with *JOBCTL special authority does not need any
authority to the output queue. A user with *SPLCTL special authority does not need any authority to the
output queue.
|
|
The REPLACE parameter is not available in the S/38 environment. REPLACE(*YES) is equivalent to using
a function key from the programmer menu to delete the current object.
The *UPDADD option in only available on the MBROPT parameter of the CPYF command.
|
|
This does not apply to the REPLACE parameter on the CRTJVAPGM command.
|
|
Referenced Object
For Object
|
|
|
||
|
|
Authority Needed
Command
ALCOBJ
1,2,11
ANZUSROBJ
CHGOBJAUD
CHGOBJD
Referenced Object
For Object
For Library
Object
*OBJOPR
*EXECUTE
*USE
Object, if it is a file
*OBJOPR, *OBJMGT
*EXECUTE
*OBJMGT
*EXECUTE
Object
*OBJEXIST
*EXECUTE
20
For Library
18
CHGOBJOWN
3,4
*EXECUTE
Ownership or
*ALLOBJ
*EXECUTE
*DLT
*EXECUTE
*ADD
*EXECUTE
*USE
313
CHKOBJ
CPROBJ
CHKOBJITG
11
CRTDUPOBJ
3,9,11,21
1,11
DMPOBJ (Q)
DMPSYSOBJ (Q)
DSPOBJAUT
DSPOBJD
GRTOBJAUT
314
EDTOBJAUT
For Object
For Library
Object
*OBJEXIST
*EXECUTE
*EXECUTE
Ownership and
*OBJEXIST, or
*ALLOBJ
*EXECUTE
*DLT
*ADD
*USE
Object
Object
*OBJMGT
*EXECUTE
(Q)
DCPOBJ
DLCOBJ
Referenced Object
3,5,6,15
3,5,6,15
New object
*USE, *ADD
*AUTLMGT
*USE, *ADD
*OBJMGT, *USE
*USE
*OBJOPR
Object
*USE
*EXECUTE
Object
*OBJOPR
*EXECUTE
Object
*OBJOPR, *READ
*EXECUTE
Object
*OBJOPR, *READ
*EXECUTE
*OBJMGT or
*ALLOBJ special
authority or
ownership
*EXECUTE
Output file
*USE
Output file
Object
*OBJMGT
*EXECUTE
*OBJOPR, *OBJMGT
*EXECUTE
Not *EXCLUDE
*USE
Object
*OBJMGT
*EXECUTE
*OBJOPR, *OBJMGT
*EXECUTE
Not *EXCLUDE
*USE
*EXECUTE
3,7,12
140
PRTADPOBJ
For Object
For Library
Object
*OBJMGT
*OBJOPR, *OBJMGT
From-library
*CHANGE
To-library
*READ, *ADD
(Q)
20
PRTPUBAUT
PRTUSROBJ
Referenced Object
20
PRTPVTAUT
20
RCLSTG (Q)
RCLTMPSTG (Q)
RNMOBJ
RSTOBJ
3,11
3,13
(Q)
Object
*OBJMGT
*EXECUTE
Object
*OBJMGT
*UPD, *EXECUTE
*AUTLMGT
*EXECUTE
*OBJOPR, *OBJMGT
*UPD, *EXECUTE
*OBJEXIST
Media definition
*USE
*EXECUTE
*OBJOPR, *OBJEXIST
*EXECUTE, *ADD
*ADD
Owner or *SECADM
and *ALLOBJ special
authority
To-library
*EXECUTE, *ADD
(Q)
RSTOBJ
(continued)
Save file
*USE
*USE
*EXECUTE
*EXECUTE
8
*EXECUTE
N/A
*X
N/A
Optical volume
*USE
N/A
*USE
*EXECUTE
*USE
*EXECUTE
*X
22
RTVOBJD
*EXECUTE
N/A
20
*R
22
RVKPUBAUT
*EXECUTE, *ADD
*EXECUTE
*R
N/A
*X
N/A
315
RVKOBJAUT
Referenced Object
3,5,15
For Object
For Library
*X
N/A
Optical volume
*USE
N/A
*USE
*EXECUTE
*USE
*USE
*EXECUTE
*USE
*EXECUTE
*USE, *ADD
*EXECUTE
*OBJMGT, *USE,
*ADD
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
*RW
N/A
22
SAVCHGOBJ
SAVCHGOBJ
(continued)
22
22
*WX
N/A
22
*X
N/A
22, 23
*RWX
N/A
SAVOBJ
316
Optical volume
*CHANGE
*USE
*USE
*EXECUTE
8
Object
*OBJEXIST
Media definition
*USE
*EXECUTE
*USE
*EXECUTE
*USE, *ADD
*EXECUTE
*OBJMGT, *USE,
*ADD
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
*EXECUTE
Referenced Object
22
22
22, 23
24
For Library
*RW
N/A
*WX
N/A
*X
N/A
*RWX
N/A
Optical volume
*CHANGE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*RWX
N/A
Optical volume24
*CHANGE
N/A
Object
*OBJOPR
*EXECUTE
Object
Any authority
*USE
User profile
*READ
*EXECUTE
User profile
*READ
*EXECUTE
10
SAVSTG
SAVSYS
For Object
10
SAVRSTCHG
SAVRSTLIB
SAVRSTOBJ
SETOBJACC
WRKOBJ
19
WRKOBJLCK
WRKOBJOWN
WRKOBJPGP
17
17
See the OBJTYPE keyword of the ALCOBJ command for the list of object types that can be allocated and
deallocated.
This command cannot be used for documents or folders. Use the equivalent Document Library Object
(DLO) command.
You must have *ALLOBJ and *SECADM special authority to change the object owner of a program, service
program, or SQL package that adopts authority.
You must be the owner or have *OBJMGT authority and the authorities being granted or revoked.
317
Referenced Object
For Object
For Library
You must be the owner or have *ALLOBJ special authority to grant *OBJMGT or *AUTLMGT authority.
This command cannot be used for user profiles, controller descriptions, device descriptions, line
descriptions, documents, document libraries, and folders.
If you have *SAVSYS special authority, you do not need the authority specified.
If the user running the CRTDUPOBJ command has OWNER(*GRPPRF) in his user profile, the owner of the
new object is the group profile. To successfully copy authorities to a new object owned by the group
profile, the following applies:
v The user running the command must have some private authority to the from-object.
v If the user has some private authority to the object, additional authorities can be obtained from adopted
authority.
v If an error occurs while copying authorities to the new object, the newly created object is deleted.
v *OBJMGT authority is only copied if the user running the CRTDUPOBJ command is the object owner or
has *ALLOBJ special authority. Adopted authority can be used to obtain ownership or *ALLOBJ special
authority.
10
11
12
This command cannot be used for journals and journal receivers, unless the from-library is QRCL and the
to-library is the original library for the journal or journal receiver.
13
14
To check a users authority to an object, you must have the authority you are checking. For example, to
check whether a user has *OBJEXIST authority for FILEB, you must have *OBJEXIST authority to FILEB.
15
To secure an object with an authorization list or remove the authorization list from the object, you must
(one of the following):
v Own the object.
v Have *ALL authority to the object.
v Have *ALLOBJ special authority.
16
If either the original file or the renamed file has an associated authority holder, *ALL authority to the
authority holder is required.
17
18
19
To use an individual operation, you must have the authority required by the individual operation.
20
21
All authorities on the from-object are duplicated to the new object. The primary group of the new object is
determined by the group authority type (GRPAUTTYP) field in the user profile that is running the
command. If the from-object has a primary group, the new object may not have the same primary group,
but the authority that the primary group has on the from-object will be duplicated to the new object.
22
This authority check is only made when the Optical media format is Universal Disk Format.
23
This authority check is only made if you are clearing the optical volume
24
Optical volumes are not actual system objects. The link between the optical volume and the authorization
list used to secure the volume is maintained by the optical support function.
318
Authorities Needed
Access Path Recovery Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
These commands do not require object authorities.
CHGRCYAP 1,
(Q)
DSPRCYAP
EDTRBDAP
(Q)
EDTRCYAP 1,
(Q)
Referenced Object
For Object
For Library
ADDFNTTBLE
Font table
*CHANGE
*EXECUTE
CHGCDEFNT
Font resource
*CHANGE
*EXECUTE
CHGFNTTBLE
Font table
*CHANGE
*EXECUTE
CRTFNTRSC
Source file
*USE
*EXECUTE
Font table
CRTFORMDF
Source file
*READ, *ADD
See General Rules on
page 311
*READ, *ADD
*USE
CRTOVL
*READ, *ADD
Source file
*USE
*EXECUTE
*READ, *ADD
Overlay: REPLACE(*YES)
*READ, *ADD
Source file
*USE
*EXECUTE
CRTPAGSEG
*EXECUTE
*READ, *ADD
Overlay: REPLACE(*NO)
CRTPAGDFN
*READ, *ADD
*READ, *ADD
*READ, *ADD
Source file
*USE
*EXECUTE
*READ, *ADD
*READ, *ADD
DLTFNTRSC
Font resource
*OBJEXIST
*EXECUTE
DLTFNTTBL
Font table
*CHANGE
*EXECUTE
DLTFORMDF
Form definition
*OBJEXIST
*EXECUTE
319
Printing Commands
Authority Needed
Command
Referenced Object
For Object
For Library
DLTOVL
Overlay
*OBJEXIST
*EXECUTE
DLTPAGDFN
Page definition
*OBJEXIST
*EXECUTE
DLTPAGSEG
Page segment
*OBJEXIST
*EXECUTE
DSPCDEFNT
Font resource
*USE
*EXECUTE
DSPFNTRSCA
Font resource
*USE
*EXECUTE
DSPFNTTBL
Font table
*USE
*EXECUTE
Font table
*CHANGE
*EXECUTE
Font resource
*USE
*USE
Form definition
*USE
*USE
Overlay
*USE
*USE
Page definition
Any authority
*USE
Page segment
*USE
Any authority
RMVFNTTBLE
WRKFNTRSC
WRKFORMDF
WRKOVL
WRKPAGDFN
WRKPAGSEG
1
1
1
To use individual operations, you must have the authority required by the individual operation.
CHGIPSIFC1
CHGIPSLOC1
CHGIPSTOS1
CVTIPSIFC
CVTIPSLOC
ENDIPSIFC (Q)
PRTIPSCFG
RMVIPSIFC1
RMVIPSLOC1
RMVIPSRTE1
STRIPSIFC (Q)
Alerts
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE to others.
Authority Needed
Command
Referenced Object
For Object
For Library
ADDALRD
Alert table
*USE, *ADD
*EXECUTE
CHGALRD
Alert table
*USE, *UPD
*EXECUTE
CHGALRTBL (Q)
Alert table
*CHANGE
*EXECUTE
CRTALRTBL (Q)
Alert table
DLTALR
*USE, *DLT
*EXECUTE
DLTALRTBL (Q)
Alert table
*OBJEXIST
*EXECUTE
RMVALRD
Alert table
*USE, *DLT
*EXECUTE
*USE
*EXECUTE
WRKALR
320
*READ, *ADD
Alerts
Authority Needed
Command
WRKALRD
WRKALRTBL
1
Referenced Object
For Object
For Library
Alert table
*USE
*EXECUTE
Alert table
*READ
*USE
To use individual operations, you must have the authority required by the individual operation.
Referenced Object
For Object
EXPPART
For Library
*USE, *ADD
*OBJOPR, *OBJMGT,
*OBJEXIST
*OBJOPR, *OBJMGT,
*ADD
*USE, *ADD
*OBJOPR, *OBJMGT,
*OBJEXIST, *ADD,
*DLT
*USE, *ADD
*OBJMGT, *USE
*USE
*USE
*USE
FNDSTRPDM
Source part
*READ
*EXECUTE
MRGFORMD
Form description
*READ
*EXECUTE
Source file
*USE
STRAPF
STRBGU
Chart
STRDFU
STRPDM
*EXECUTE
*READ, *ADD
*OBJEXIST
*EXECUTE
*USE
*EXECUTE
*OBJOPR, *ADD,
*UPD, *DLT
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*OBJEXIST
*EXECUTE
321
Referenced Object
For Object
STRRLU
Source file
*OBJOPR, *OBJMGT
*READ, *ADD
Browse a member
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
Remove a member
*OBJOPR, *OBJEXIST
*EXECUTE
*OBJOPR
*EXECUTE
Source file
Delete member
*ALL
*EXECUTE
Source file
*USE
*EXECUTE
Add a member
*USE, *OBJMGT
*READ, *ADD
Browse a member
*USE
*EXECUTE
Print a member
*USE
*EXECUTE
Remove a member
*USE, *OBJEXIST
*EXECUTE
*USE, *OBJMGT
*EXECUTE
*READ
*EXECUTE
Source file
*USE
*EXECUTE
File
*READ
*EXECUTE
*READ
*EXECUTE
*READ
*EXECUTE
STRSDA
STRSEU
1,4
WRKGRPPDM
WRKLIBPDM
WRKMBRPDM
WRKOBJPDM
WRKPARTPDM
WRKPRJPDM
Group
For Library
1,4
1,4
To use the individual operations, you must have the authority required by the individual operation.
For more information, see the WebSphere Development Studio: Application Development Manager Users Guide
book.
Referenced Object
For Object
For Library
CRTAUTHLR (Q)
*ALL
*EXECUTE
DLTAUTHLR
Authority holder
*ALL
*EXECUTE
DSPAUTHLR
Output file
322
Referenced Object
For Object
ADDAUTLE
Authorization list
*AUTLMGT or
ownership
*EXECUTE
CHGAUTLE
Authorization list
*AUTLMGT or
ownership
*EXECUTE
DLTAUTL
Authorization list
Owner or *ALLOBJ
*EXECUTE
DSPAUTL
Authorization list
CRTAUTL
*EXECUTE
Output file
DSPAUTLDLO
Authorization list
*USE
*EXECUTE
DSPAUTLOBJ
Authorization list
*READ
*EXECUTE
Output file
Authorization list
*AUTLMGT or
ownership
*EXECUTE
Authorization list
*AUTLMGT or
ownership
*EXECUTE
Authorization list
*AUTLMGT or
ownership
*EXECUTE
EDTAUTL 1
RMVAUTLE
RTVAUTLE
WRKAUTL 3,4,5
Authorization list
You must be the owner or have authorization list management authority and have the authorities being
given or taken away.
If do not have *OBJMGT or *AUTLMGT, you can retrieve *PUBLIC authority and your own authority. You
must have *READ authority to your own profile to retrieve your own authority.
To use an individual operation, you must have the authority required by the operation
Referenced Object
For Object
For Library
ADDBNDDIRE
Binding directory
*OBJOPR, *ADD
*USE
CRTBNDDIR
Binding directory
DLTBNDDIR
Binding directory
*OBJEXIST
*EXECUTE
DSPBNDDIR
Binding directory
*READ, *OBJOPR
*USE
Binding directory
*OBJOPR, *DLT
*READ, *OBJOPR
Binding directory
Any authority
*USE
Binding directory
*READ, *OBJOPR
*USE
RMVBNDDIRE
WRKBNDDIR
WRKBNDDIRE
1
*READ, *ADD
To use individual operations, you must have the authority required by the operation.
323
Referenced Object
For Object
For Library
ADDCMDCRQA (Q)
*CHANGE
*EXECUTE
ADDOBJCRQA (Q)
*CHANGE
*EXECUTE
ADDPRDCRQA (Q)
*CHANGE
*EXECUTE
ADDPTFCRQA (Q)
*CHANGE
*EXECUTE
ADDRSCCRQA (Q)
*CHANGE
*EXECUTE
CHGCMDCRQA (Q)
*CHANGE
*EXECUTE
CHGOBJCRQA (Q)
*CHANGE
*EXECUTE
CHGPRDCRQA (Q)
*CHANGE
*EXECUTE
CHGPTFCRQA (Q)
*CHANGE
*EXECUTE
CHGCRQD
*CHANGE
*EXECUTE
CHGRSCCRQA (Q)
*CHANGE
*EXECUTE
CRTCRQD
DLTCRQD
*OBJEXIST
*EXECUTE
RMVCRQDA
*CHANGE
*EXECUTE
WRKCRQD
1
*READ, *ADD
*EXECUTE
To use an individual operation, you must have the authority required by the operation
Chart Commands
Authority Needed
Command
Referenced Object
For Object
For Library
DLTCHTFMT
Chart format
*OBJEXIST
*EXECUTE
DSPCHT
Chart format
*USE
*USE
Database file
*USE
*USE
Database file
*USE
*USE
Chart format
*CHANGE,
*OBJEXIST
*EXECUTE
Chart format
Any authority
*USE
DSPGDF
STRBGU (Option 3)
WRKCHTFMT
To use an individual operation, you must have the authority required by the operation .
Option 3 on the BGU menu (shown when STRGBU is run) is the Change chart format option.
Class Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CHGCLS
Class
*OBJMGT, *OBJOPR
*EXECUTE
324
Class Commands
Authority Needed
Command
Referenced Object
CRTCLS
Class
DLTCLS
Class
*OBJEXIST
*EXECUTE
Class
*OBJOPR
*EXECUTE
Class
*OBJOPR
*USE
DSPCLS
WRKCLS
1
For Object
For Library
*READ, *ADD
To use an individual operation, you must have the authority required by the operation .
Class-of-Service Commands
Authority Needed
Command
3
CHGCOSD
CRTCOSD
For Object
For Library
Class-of-service description
*CHANGE, OBJMGT
*EXECUTE
Class-of-service description
*OBJEXIST
*EXECUTE
Class-of-service description
*USE
*EXECUTE
Class-of-service description
*OBJOPR
*EXECUTE
Class-of-service description
DLTCOSD
DSPCOSD
WRKCOSD
Referenced Object
1,2
To use individual operations, you must have the authority required by the individual operation.
Referenced Object
For Object
For Library
CHGCMD
Command
*OBJMGT
*EXECUTE
CHGCMDDFT
Command
*OBJMGT, *USE
*EXECUTE
CRTCMD
Source file
*USE
*EXECUTE
Command: REPLACE(*NO)
*READ, *ADD
Command: REPLACE(*YES)
DLTCMD
Command
*OBJEXIST
*EXECUTE
DSPCMD
Command
*USE
*EXECUTE
SBMRMTCMD
Command
*OBJOPR
*EXECUTE
DDM file
*USE
*EXECUTE
Command
Any authority
*USE
Command
Any authority
*USE
SLTCMD
WRKCMD
To use individual operations, you must have the authority required by the individual operation.
325
Referenced Object
For Object
For Library
*OBJOPR, *ADD
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
*CHANGE
*EXECUTE
*OBJOPR *READ
*EXECUTE
COMMIT
ENDCMTCTL
ROLLBACK
STRCMTCTL
WRKCMTDFN
1
Any user can run this command for commitment definitions that belong to a job that is running under the
user profile of the user. A user who has job control (*JOBCTL) special authority can run this command for
any commitment definition.
Referenced Object
CHGCSI
CRTCSI
For Object
For Library
*USE, *OBJMGT
*EXECUTE
*CHANGE
*READ, *ADD
*CHANGE
DLTCSI
*OBJEXIST
*EXECUTE
DSPCSI
*READ
*EXECUTE
WRKCSI
*USE
*EXECUTE
Configuration Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
Authority Needed
Command
Referenced Object
For Object
PRTDEVADR
*USE
*EXECUTE
Device description
*USE
*EXECUTE
326
For Library
Configuration Commands
Authority Needed
Command
Referenced Object
5
RSTCFG (Q)
For Object
*OBJEXIST
For Library
1
*EXECUTE
To-library
*ADD, *EXECUTE
*ADD
Tape unit
*USE
*EXECUTE
1
*EXECUTE
*USE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
RTVCFGSTS
Object
*OBJOPR
*EXECUTE
RTVCFGSRC
Object
*USE
*EXECUTE
Source file
*OBJOPR, *OBJMGR,
*ADD, *DLT
*EXECUTE
*USE, *ADD
*EXECUTE
*USE, *ADD,
*OBJMGT
*EXECUTE
Object
*USE, *OBJMGT
*EXECUTE
Object
*OBJOPR
*EXECUTE
SAVCFG
SAVRSTCFG
VRYCFG
3,6
WRKCFGSTS
If you have *SAVSYS special authority, you do not need the authority specified.
If a user has *JOBCTL special authority, authority to the device is not needed.
To use the individual operations, you must have the authority required by the individual operation.
You must have *IOSYSCFG special authority for media library when status is *ALLOCATE or
*DEALLOCATE.
CHGCFGL 2
CHGCFGLE
CPYCFGL 2
Referenced Object
For Object
Configuration list
For Library
Configuration list
Configuration list
Configuration list
*USE, *OBJMGT
*ADD
327
Referenced Object
2
CRTCFGL
2
2
RMVCFGLE
1, 2
WRKCFGL
For Library
Configuration list
*OBJEXIST
*EXECUTE
Configuration list
*USE, *OBJMGT
*EXECUTE
Configuration list
Configuration list
*OBJOPR
Configuration list
DLTCFGL
DSPCFGL
For Object
*EXECUTE
To use the individual operations, you must have the authority required by the individual operation.
ADDCNNLE
CHGCNNL
2
2
CHGCNNLE
CRTCNNL
Referenced Object
For Object
Connection list
Connection list
Connection list
For Library
*EXECUTE
DLTCNNL
DSPCNNL
Connection list
*OBJEXIST
*EXECUTE
*EXECUTE
Connection list
*USE
RMVCNNLE
Connection list
RNMCNNLE
Connection list
Connection list
*OBJOPR
*EXECUTE
Connection list
*USE
*EXECUTE
WRKCNNL
1
1
WRKCNNLE
1
To use the individual operations, you must have the authority required by the individual operation.
CHGCTLASC
CHGCTLBSC
CHGCTLFNC
328
Referenced Object
For Object
Controller description
*USE
*EXECUTE
*USE
*EXECUTE
Controller description
*USE
Controller description
*USE
Controller description
*USE
For Library
*EXECUTE
*EXECUTE
*EXECUTE
CHGCTLLWS
CHGCTLNET
CHGCTLRTL
CHGCTLRWS
CHGCTLTAP
CHGCTLVWS
CRTCTLAPPC
2
2
Referenced Object
For Object
For Library
Controller description
*USE
*EXECUTE
*USE
*EXECUTE
Controller description
Program (INZPGM)
*USE
Controller description
Controller description
*USE
Controller description
*USE
*EXECUTE
*USE
*EXECUTE
Controller description
Controller
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Program (INZPGM)
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*EXECUTE
*EXECUTE
Controller description
CRTCTLASC
Controller description
CRTCTLBSC
Controller description
CRTCTLFNC
Controller description
CRTCTLHOST
Controller description
CRTCTLLWS
CRTCTLNET
Controller description
CRTCTLRTL
Controller description
329
CRTCTLRWS
Referenced Object
For Object
For Library
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Controller description
CRTCTLTAP
CRTCTLVWS
DLTCTLD
Controller description
*OBJEXIST
*EXECUTE
DSPCTLD
Controller description
*USE
*EXECUTE
Controller description
*USE
*EXECUTE
Controller description
*USE
*EXECUTE
Controller description
*OBJOPR
*EXECUTE
ENDCTLRCY
PRTCMNSEC
2, 3
RSMCTLRCY
WRKCTLD
To use the individual operations, you must have the authority required by the individual operation.
Cryptography Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
Authority Needed
Command
Referenced Object
For Object
For Library
ADDCRSDMNK (Q)
QUSRSYS/QACRKTBL *FILE
*OBJOPR, *ADD
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
QUSRSYS/QACRKTBL *FILE
*OBJOPR, *READ,
*UPD
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
QUSRSYS/QACRKTBL *FILE
*OBJOPR, *READ,
*UPD
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
QUSRSYS/QACRKTBL *FILE
*OBJOPR, *ADD
*EXECUTE
CHGCRSDMNK (Q)
CHGMSTK (Q)
CPHDTA (Q)
ENCCPHK (Q)
ENCFRMMSTK (Q)
ENCTOMSTK (Q)
QUSRSYS/QACRKTBL *FILE
*OBJOPR, *READ
*EXECUTE
GENCPHK (Q)
QUSRSYS/QACRKTBL *FILE
*OBJOPR, *READ
*EXECUTE
330
Cryptography Commands
Authority Needed
Command
Referenced Object
For Object
For Library
GENCRSDMNK (Q)
QUSRSYS/QACRKTBL *FILE
*OBJOPR, *ADD
*EXECUTE
QCRP/QPCRGENX *FILE
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
GENPIN (Q)
QUSRSYS/QACRKTBL *FILE
*OBJOPR, *READ
*EXECUTE
RMVCRSDMNK (Q)
QUSRSYS/QACRKTBL *FILE
*OBJOPR, *READ,
*DLT
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
QUSRSYS/QACRKTBL *FILE
*OBJOPR, *READ,
*UPD
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
TRNPIN (Q)
QUSRSYS/QACRKTBL *FILE
*OBJOPR, *READ
*EXECUTE
VFYMSTK (Q)
*OBJOPR, *ADD
*EXECUTE
VFYPIN (Q)
QUSRSYS/QACRKTBL *FILE
*OBJOPR, READ
*EXECUTE
GENMAC (Q)
SETMSTK (Q)
Referenced Object
For Object
For Library
Data area
*CHANGE
*EXECUTE
Data area
APPC device description
DLTDTAARA
DSPDTAARA
RTVDTAARA
WRKDTAARA
*READ, *ADD
4
*CHANGE
Data area
*OBJEXIST
*EXECUTE
Data area
*OBJOPR
*EXECUTE
Data area
*OBJOPR
*EXECUTE
Data area
Any authority
*USE
If the create and change data area commands are run using high-level language functions, these authorities
are still required although authority to the command is not.
To use an individual operation, you must have the authority required by the operation.
331
Referenced Object
CRTDTAQ
Data queue
DLTDTAQ
WRKDTAQ
For Object
For Library
*READ, *ADD
*OBJOPR, *ADD
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*CHANGE
Data queue
*OBJEXIST
*EXECUTE
Data queue
*READ
*USE
To use individual operations, you must have the authority required by the individual operation.
CFGDEVMLB
CHGDEVAPPC
4
CHGDEVASC
CHGDEVASP
4
4
CHGDEVBSC
CHGDEVDKT
CHGDEVDSP
CHGDEVFNC
CHGDEVHOST
Referenced Object
For Object
For Library
Device description
Device description
*USE
Device description
Device description
Device description
Device description
Device description
Printer (PRINTER)
*USE
Device description
Device description
*EXECUTE
*EXECUTE
Device description
CHGDEVMLB
Device description
CHGDEVNET
Device description
CHGDEVOPT
Device description
CHGDEVPRT
Device description
CHGDEVRTL
CHGDEVINTR
Device description
CHGDEVSNPT
Device description
CHGDEVSNUF
Device description
Device description
*USE
*EXECUTE
*USE
*EXECUTE
CHGDEVTAP
CRTDEVAPPC
4
4
Device description
Mode description (MODE)
332
Referenced Object
For Object
For Library
*USE
*EXECUTE
CRTDEVASC
CRTDEVASP
Device description
CRTDEVBSC
Device description
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Device description
4
CRTDEVDKT
Device description
CRTDEVDSP
Device description
4
CRTDEVFNC
CRTDEVHOST
CRTDEVINTR
Device description
CRTDEVMLB
Device description
CRTDEVNET
CRTDEVOPT
Device description
CRTDEVPRT
CRTDEVRTL
*EXECUTE
*USE
*EXECUTE
Device description
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Device description
*OBJEXIST
*EXECUTE
DSPCNNSTS
Device description
*OBJOPR
*EXECUTE
DSPDEVD
Device description
*USE
*EXECUTE
Device description
*USE
*EXECUTE
Device description
*OBJOPR
*EXECUTE
RLSCMNDEV
Device description
*OBJOPR
*EXECUTE
RSMDEVRCY
Device description
*USE
*EXECUTE
Device description
*OBJOPR
*EXECUTE
Device description
Controller description (CTL)
Device description
CRTDEVSNPT
CRTDEVSNUF
CRTDEVTAP
DLTDEVD
ENDDEVRCY
HLDCMNDEV
PRTCMNSEC
WRKDEVD
4, 5
333
Referenced Object
For Object
For Library
To remove an associated output queue, object existence (*OBJEXIST) authority to the output queue and
read authority to the QUSRSYS library are required.
You must have job control (*JOBCTL) special authority and object operational authority to the device
description.
To use individual operations, you must have the authority required by the individual operation.
Referenced Object
For Object
For Library
ADDEMLCFGE
*CHANGE
*EXECUTE
CHGEMLCFGE
*CHANGE
*EXECUTE
EJTEMLOUT
*EXECUTE
*OBJOPR
*EXECUTE
*EXECUTE
*OBJOPR
*EXECUTE
*EXECUTE
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
RMVEMLCFGE
*CHANGE
*EXECUTE
STREML3270
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
*EXECUTE
*OBJOPR
*EXECUTE
SNDEMLIGC
From-file
*OBJOPR
*EXECUTE
TRMPRTEML
*OBJOPR
*EXECUTE
ENDPRTEML
EMLPRTKEY
EML3270
STRPRTEML
334
CHGDIRSHD 1
CPYFRMDIR 1
CPYTODIR 1
DSPDIRE
ENDDIRSHD
RMVDIRE 1
RMVDIRSHD
RNMDIRE 2
STRDIRSHD 4
WRKDIRE 3,5
WRKDIRLOC 1,5
WRKDIRSHD 1,5
A user with *SECADM special authority can work with all directory entries. Users without *SECADM
special authority can work only with their own entries.
To use an individual operation, you must have the authority required by the operation.
Disk Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
These commands to not require authority to any objects:
ENDDSKRGZ (Q)
1
STRDSKRGZ (Q)
WRKDSKSTS
Referenced Object
For Object
For Library
*CHANGE
*EXECUTE
*CHANGE
*EXECUTE
*USE
*EXECUTE
*CHANGE
*EXECUTE
ENDPASTHR
STRPASTHR
*USE
TFRPASTHR
1
The user profile that requires this authority is the profile that runs the pass-through batch job. For
pass-through that bypasses the sign-on display, the user profile is the one specified in the remote user
(RMTUSER) parameter. For pass-through that uses the normal sign-on procedure (RMTUSER(* NONE)),
the user is the default user profile specified in the communications entry of the subsystem that handles the
pass-through request. Generally, this is QUSER.
If the pass-through is one that uses the normal sign-on procedure, the user profile specified on the sign-on
display on the target system must have authority to this object.
335
Distribution Commands
Distribution Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
Authority Needed
Command
Referenced Object
For Object
For Library
*CHANGE
*EXECUTE
Journal
*USE
*EXECUTE
Journal receiver
*USE
*EXECUTE
ADDDSTQ (Q)
ADDDSTRTE (Q)
ADDDSTSYSN (Q)
CFGDSTSRV (Q)
CFGRPDS (Q)
CHGDSTD
Document
CHGDSTQ (Q)
CHGDSTRTE (Q)
1
DLTDST
DSPDSTLOG (Q)
DSPDSTSRV (Q)
HLDDSTQ (Q)
INZDSTQ (Q)
QRYDST
Requested file
*CHANGE
*EXECUTE
RCVDST
Requested file
*CHANGE
*EXECUTE
Folder
*CHANGE
*EXECUTE
*USE
*EXECUTE
RLSDSTQ (Q)
RMVDSTQ (Q)
RMVDSTRTE (Q)
RMVDSTSYSN (Q)
SNDDST
SNDDSTQ (Q)
WRKDSTQ (Q)
WRKDPCQ (Q)
1
If the user is asking for distribution for another user, the user must have the authority to work on behalf of
the other user.
336
CRTDSTL
DLTDSTL
DSPDSTL
RMVDSTLE
RNMDSTL
WRKDSTL
1
2
You must have *SECADM special authority or own the distribution list.
To use an individual operation, you must have the authority required by the operation.
Referenced Object
For Object
For Library
*ALL or owner
*EXECUTE
CHGDLOAUT
*ALL or owner
*EXECUTE
CHGDLOOWN
Owner or *ALLOBJ
special authority
*EXECUTE
*DLT
*EXECUTE
*ADD
*EXECUTE
Owner or *ALLOBJ
special authority
*EXECUTE
*DLT
*EXECUTE
*ADD
*EXECUTE
Document description
*CHANGE
*EXECUTE
As required by the
AUT keyword
*EXECUTE
Document
*CHANGE
*EXECUTE
*CHANGE
*EXECUTE
From-document
*USE
*EXECUTE
ADDDLOAUT
CHGDLOAUD
CHGDLOPGP
CHGDOCD
CHKDLO
CHKDOC
CPYDOC
CRTDOC
CRTFLR
3
DLTDLO
DLTDOCL
*EXECUTE
*CHANGE
*EXECUTE
In-folder
*CHANGE
*EXECUTE
In-folder
*CHANGE
*EXECUTE
*ALL
*EXECUTE
4
*EXECUTE
Document list
*ALL
Authorization list
*USE
*EXECUTE
*USE
*EXECUTE
DSPDLOAUD
DSPDLOAUT
*USE or owner
*EXECUTE
DSPDLONAM
*USE
*EXECUTE
DSPDOC
Document
*USE
*EXECUTE
DSPFLR
Folder
*USE
*EXECUTE
EDTDLOAUT
*ALL or owner
*EXECUTE
EDTDOC
Document
*CHANGE
*EXECUTE
Requested file
*USE
*EXECUTE
Folder
*CHANGE
*EXECUTE
DMPDLO
15
DSPAUTLDLO
FILDOC
337
Referenced Object
For Object
For Library
MOVDOC
*CHANGE
*EXECUTE
From-document
*ALL
*EXECUTE
To-folder
*CHANGE
*EXECUTE
Document
*USE
*EXECUTE
From-folder
*USE
*EXECUTE
PAGDOC
Document
*CHANGE
*EXECUTE
PRTDOC
Folder
*USE
*EXECUTE
Document
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Requested file
*USE
*EXECUTE
*CHANGE
*EXECUTE
*CHANGE or owner
*EXECUTE
MRGDOC
QRYDOCLIB
2,6
RCLDLO
RGZDLO
16
RMVDLOAUT
*ALL or owner
*EXECUTE
RNMDLO
*ALL
*EXECUTE
In-folder
*CHANGE
*EXECUTE
Requested file
*READ
*EXECUTE
Document
*CHANGE
*EXECUTE
RPLDOC
338
Referenced Object
RSTDLO
For Object
10
*CHANGE
10
*ADD
*EXECUTE
Save file
*USE
*EXECUTE
*R
N/A
*X
N/A
Optical volume
*USE
N/A
*USE
*EXECUTE
S/36 folder
*USE
*EXECUTE
To-folder
*CHANGE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*CHANGE
*EXECUTE
*USE
*EXECUTE
Requested file
*CHANGE
17
RTVDLONAM
RTVDOC
SAVDLO
7,13
10
*EXECUTE
*ALL
*EXECUTE
*USE
*EXECUTE
*USE, *ADD
*EXECUTE
*USE, *ADD,
*OBJMGT
*EXECUTE
*RW
N/A
*WX
N/A
*X
N/A
*RWX
N/A
*CHANGE
N/A
Optical Volume
SAVRSTDLO
*EXECUTE
17
RSTS36FLR
*EXECUTE
*ALL
11,12,14
For Library
10
WRKDOC
Folder
*USE
WRKFLR
Folder
*USE
339
Referenced Object
For Object
For Library
If the user is working on behalf of another user, the other users authority to the object is checked.
The user must have *ALL authority to all the objects in the folder in order to delete the folder and all the
objects in the folder.
If you have *ALLOBJ or *SECADM special authority, you do not need all *ALL authority to the document
library list.
The user must have authority to the object being used as the merge source. For example, if
MRGTYPE(*QRY) is specified, the user must have use authority to the query specified for the QRYDFN
parameter.
Only objects that meet the criteria of the query and to which the user has at least *USE authority are
returned in the document list or output file.
*SAVSYS or *ALLOBJ special authority is required to use the following parameter combination: RSTDLO
DLO(*MAIL).
10
If you have *SAVSYS or *ALLOBJ special authority, you do not need the authority specified.
11
You need *ALL authority to the document if replacing it. You need operational and all the data authorities
to the folder if restoring new information into the folders, or you need *ALLOBJ special authority.
12
If used for a data dictionary, only the authority to the command is required.
13
*SAVSYS or *ALLOBJ special authority is required to use the following parameter combinations:
SAVDLO DLO(*ALL) FLR(*ANY)
SAVDLO DLO(*MAIL)
SAVDLO DLO(*CHG)
SAVDLO DLO(*SEARCH) OWNER(not *CURRENT)
14
You must be enrolled in the system distribution directory if the source folder is a document folder.
15
You must have *ALLOBJ special authority to dump internal document library objects.
16
17
This authority check is only made when the Optical Media Format is Universal Disk Format (UDF).
18
This authority check is only made when you are clearing the optical volume.
19
Optical volumes are not actual system objects. The link between the optical volume and the authorization
list used to secure the volume is maintained by the optical support function.
Referenced Object
For Object
For Library
CPYIGCTBL
*ALL
*EXECUTE
*USE
*EXECUTE
CRTIGCDCT
DLTIGCDCT
340
*READ, *ADD
*OBJEXIST
*EXECUTE
Referenced Object
For Object
For Library
DLTIGCSRT
*OBJEXIST
*EXECUTE
DLTIGCTBL
*OBJEXIST
*EXECUTE
DSPIGCDCT
*USE
*EXECUTE
EDTIGCDCT
*USE, *UPD
*EXECUTE
User dictionary
*ADD, *DLT
*EXECUTE
*CHANGE
*EXECUTE
*CHANGE
*EXECUTE
*OBJOPR, *READ
*ADD, *UPD
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*CHANGE
*EXECUTE
STRCGU
STRFMA
Referenced Object
CRTEDTD
Edit description
DLTEDTD
Edit description
*OBJEXIST
*EXECUTE
Edit description
*OBJOPR
*EXECUTE
Edit description
Any authority
*USE
DSPEDTD
WRKEDTD
1
For Object
For Library
*EXECUTE, *ADD
To use an individual operation, you must have the authority required by the operation .
CHGENVVAR
RMVENVVAR1
WRKENVVAR1
Referenced Object
For Object
For Library
ADDEWCBCDE
Source file
*USE
*EXECUTE
ADDEWCM
Source file
*USE
*EXECUTE
ADDEWCPTCE
Source file
*USE
*EXECUTE
ADDEWLM
Source file
*USE
*EXECUTE
CHGEWCBCDE
Source file
*USE
*EXECUTE
CHGEWCM
Source file
*USE
*EXECUTE
CHGEWCPTCE
Source file
*USE
*EXECUTE
341
Referenced Object
For Object
For Library
CHGEWLM
Source file
*USE
*EXECUTE
DSPEWCBCDE
Source file
*USE
*EXECUTE
DSPEWCM
Source file
*USE
*EXECUTE
DSPEWCPTCE
Source file
*USE
*EXECUTE
DSPEWLM
Source file
*USE
*EXECUTE
RMVEWCBCDE
Source file
*USE
*EXECUTE
RMVEWCPTCE
Source file
*USE
*EXECUTE
File Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
Authority Needed
Command
Referenced Object
For Object
For Library
ADDICFDEVE
ICF file
*OBJOPR, *OBJMGT
*EXECUTE
ADDLFM
Logical file
*OBJOPR, *OBJMGT
or *OBJALTER
*EXECUTE, *ADD
*OBJOPR, *OBJMGT
or *OBJALTER
*EXECUTE
*OBJOPR
*EXECUTE
*OBJMGT or
*OBJALTER
*EXECUTE
*OBJMGT
*EXECUTE
ADDPFM
Physical file
*OBJOPR, *OBJMGT
or *OBJALTER
*EXECUTE, *ADD
ADDPFTRG
*OBJALTER,
*OBJMGT, *READ,
*OBJOPR
*EXECUTE
*OBJALTER,
*OBJMGT, *READ,
*OBJOPR
*EXECUTE
*OBJALTER,
*OBJMGT, *READ,
*OBJOPR
*EXECUTE
Trigger program
*EXECUTE
*EXECUTE
*OBJOPR, *OBJMGT
*EXECUTE
ADDPFCST
CHGDDMF
DDM file
Device description
CHGDKTF
342
*CHANGE
Diskette file
*OBJOPR, *OBJMGT
*EXECUTE
*OBJOPR
*EXECUTE
File Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CHGDSPF
Display file
*OBJOPR, *OBJMGT
*EXECUTE
*OBJOPR
*EXECUTE
Data file
*OBJOPR, *ADD,
*UPD, *DLT
*EXECUTE
Program
*USE
*EXECUTE
Display file
*USE
*EXECUTE
CHGICFDEVE
ICF file
*OBJOPR, *OBJMGT
*EXECUTE
CHGICFF
ICF file
*OBJOPR, *OBJMGT
*EXECUTE
CHGLF
Logical file
*OBJMGT or
*OBJALTER
*EXECUTE
CHGLFM
Logical file
*OBJMGT or
*OBJALTER
*EXECUTE
CHGPF
Physical file
*OBJMGT or
*OBJALTER
*EXECUTE
CHGPFCST
Dependent file
*OBJMGT or
*OBJALTER
*EXECUTE
CHGPFM
Physical file
*OBJMGT or
*OBJALTER
*EXECUTE
CHGPFTRG
Physical file
*OBJMGT or
*OBJALTER
*EXECUTE
CHGPRTF
Print file
*OBJOPR, *OBJMGT
*EXECUTE
*OBJOPR
*EXECUTE
CHGSAVF
Save file
*OBJOPR, *OBJMGT
*EXECUTE
CHGSRCPF
*OBJMGT or
*OBJALTER
*EXECUTE
CHGTAPF
Tape file
*OBJOPR, *OBJMGT
*EXECUTE
*OBJOPR
*EXECUTE
CLRPFM
Physical file
*OBJOPR, *OBJMGT
or *OBJALTER, *DLT
*EXECUTE
CLRSAVF
Save file
*OBJOPR, *OBJMGT
*EXECUTE
CPYF
From-file
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*READ
*EXECUTE
From-file
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *READ
*EXECUTE
CHGDTA
CPYFRMDKT
343
File Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CPYFRMIMPF
From-file
*OBJOPR, *READ
*USE
*OBJOPR, *READ
*USE
*READ
*USE
From-file
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *READ
*EXECUTE
Stream file
*R
*X
*X, *ADD
CPYFRMQRYF
CPYFRMSTMF
CPYFRMTAP
CPYSRCF
CPYTODKT
CPYTOIMPF
344
*X
*X
*X, *ADD
*X, *OBJMGT, or
*OBJALTER
*X
From-file
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *READ
*EXECUTE
From-file
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*READ
*EXECUTE
From-file
*OBJOPR, *READ
*USE
*OBJOPR, *READ
*USE
*READ
*USE
File Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CPYTOSTMF
Database file
*RX
*X
*W
CPYTOTAP
CRTDDMF
*RWX
*X
*X
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*READ
*EXECUTE
*READ, *ADD
*CHANGE
*OBJOPR
CRTDSPF
CRTICFF
*READ, *ADD
*EXECUTE
*READ, *ADD,
*EXECUTE
*READ, *ADD,
*EXECUTE
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
*EXECUTE
*READ, *ADD,
*EXECUTE
*READ, *ADD,
*EXECUTE
Source file
*USE
*EXECUTE
*EXECUTE
*READ, *ADD
*READ, *ADD
345
File Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CRTLF
Source file
*USE
*EXECUTE
*OBJOPR, *OBJMGT
or *OBJALTER
*EXECUTE
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
*OBJOPR, *OBJMGT
or *OBJALTER
*EXECUTE
*OBJOPR
*EXECUTE
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Logical file
CRTPF
*EXECUTE, *ADD
Physical file
CRTPRTF
*EXECUTE, *ADD
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
*READ, *ADD,
*EXECUTE
See General Rules on
page 311
*READ, *ADD,
*EXECUTE
CRTSAVF
Save file
*READ, *ADD,
*EXECUTE
CRTSRCPF
*READ, *ADD,
*EXECUTE
CRTS36DSPF
*ALL
*CHANGE
*USE
*EXECUTE
CRTTAPF
*READ, *ADD
*READ, *ADD
*OBJOPR
*EXECUTE
*READ, *ADD
*READ, *ADD
*OBJOPR
*EXECUTE
DLTF
File
*OBJOPR, *OBJEXIST
*EXECUTE
DSPCPCST
*OBJOPR, *READ
*EXECUTE
346
File Commands
Authority Needed
Command
Referenced Object
For Object
For Library
DSPDBR
Database file
*OBJOPR
*EXECUTE
DSPDDMF
DDM file
*OBJOPR
DSPDTA
Data file
*USE
*EXECUTE
Program
*USE
*EXECUTE
Display file
*USE
*EXECUTE
File
*OBJOPR
*EXECUTE
Output file
DSPFD
File is a physical file and TYPE(*ALL, *MBR, A data authority other *EXECUTE
OR *MBRLST) is specified
than *EXECUTE
DSPFFD
File
*OBJOPR
*EXECUTE
Output file
DSPPFM
Physical file
*USE
*EXECUTE
DSPSAVF
Save file
*USE
*EXECUTE
EDTCPCST
*CHANGE
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
GENCAT
Database file
*EXECUTE
INZPFM
*OBJOPR, *OBJMGT
*EXECUTE
or *OBJALTER, *ADD
*OBJOPR, *OBJMGT
*EXECUTE
or *OBJALTER, *ADD,
*DLT
Target file
Maintenance file
*USE
*EXECUTE
Root file
*USE
*EXECUTE
OPNDBF
Database file
*EXECUTE
OPNQRYF
Database file
*EXECUTE
RGZPFM
*OBJOPR, *OBJMGT
*EXECUTE
or *OBJALTER,
*READ, *ADD, *UPD,
*DLT, *EXECUTE
RMVICFDEVE
ICF file
*OBJOPR, *OBJMGT
*EXECUTE
RMVM
*OBJEXIST, *OBJOPR
*EXECUTE
MRGSRC
PRTTRGPGM
347
File Commands
Authority Needed
Command
Referenced Object
For Object
For Library
RMVPFCST
File
*OBJMGT or
*OBJALTER
*EXECUTE
RMVPFTRG
Physical file
*OBJALTER,
*OBJMGT
*EXECUTE
RNMM
*OBJOPR, *OBJMGT
*EXECUTE, *UPD
To-file
*ALL
From-file
*USE
*EXECUTE
*CHANGE
*EXECUTE
*USE
*EXECUTE
RTVMBRD
File
*USE
*EXECUTE
SAVSAVFDTA
*USE
*EXECUTE
Save file
*USE
*EXECUTE
*RW
N/A
*WX
N/A
*X
N/A
*RWX
N/A
Optical Volume
*CHANGE
N/A
From-file
*USE
*EXECUTE
*ALL
*USE
*EXECUTE
*ALL
From-file
*USE
*EXECUTE
*USE
*EXECUTE
Source file
*USE
*EXECUTE
*CHANGE
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
RSTS36F
(Q)
8,9
10
SAVS36F
SAVS36LIBM
STRAPF
STRDFU
UPDDTA
348
*READ, *ADD
*OBJEXIST
*READ, *ADD
*OBJOPR, *ADD,
*UPD, *DLT
*EXECUTE
*READ
*EXECUTE
File
*CHANGE
*EXECUTE
File Commands
Authority Needed
Command
WRKCMTDFN
WRKDDMF
WRKF
3,5
WRKPFCST
Referenced Object
For Object
For Library
DDM file
*OBJOPR, *OBJMGT,
*OBJEXIST
*READ, *ADD
Files
*OBJOPR
*USE
*EXECUTE
The CPYFRMQRYF command uses a FROMOPNID parameter rather than a FROMFILE parameter. A user
must have sufficient authority to perform the OPNQRYF command prior to running the CPYFRMQRYF
command. If CRTFILE(*YES) is specified on the CPYFRMQRYF command, the first file specified on the
corresponding OPNQRYF FILE parameter is considered to be the from-file when determining the
authorities for the new to-file. (See note 1 of General Rules on page 311.)
To use individual operations, you must have the authority required by the individual operation.
If a new file is created and an authority holder exists for the file, then the user must have all (*ALL)
authority to the authority holder or be the owner of the authority holder. If there is no authority holder, the
owner of the file is the user who entered the RSTS36F command and the public authority is *ALL.
This authority check is only made when the Optical media format is Universal Disk Format (UDF).
This authority check is only made if you are clearing the optical volume.
10
Optical volumes are not actual system objects. The link between the optical volume and the authorization
list used to secure the volume is maintained by the optical support function.
Filter Commands
Authority Needed
Command
Referenced Object
For Object
For Library
ADDALRACNE
Filter
*USE, *ADD
*EXECUTE
ADDALRSLTE
Filter
*USE, *ADD
*EXECUTE
ADDPRBACNE
Filter
*USE, *ADD
*EXECUTE
ADDPRBSLTE
Filter
*USE, *ADD
*EXECUTE
CHGALRACNE
Filter
*USE, *UPD
*EXECUTE
CHGALRSLTE
Filter
*USE, *UPD
*EXECUTE
CHGFTR
Filter
*OBJMGT
*EXECUTE
CHGPRBACNE
Filter
*USE, *UPD
*EXECUTE
CHGPRBSLTE
Filter
*USE, *UPD
*EXECUTE
CRTFTR
Filter
DLTFTR
Filter
*OBJEXIST
*EXECUTE
RMVFTRACNE
Filter
*USE, *DLT
*EXECUTE
RMVFTRSLTE
Filter
*USE, *DLT
*EXECUTE
Filter
Any authority
*EXECUTE
WRKFTR
*READ, *ADD
349
Filter Commands
Authority Needed
Command
WRKFTRACNE
WRKFTRSLTE
1
Referenced Object
For Object
For Library
Filter
*USE
*EXECUTE
Filter
*USE
*EXECUTE
To use an individual operation, you must have the authority required by the operation.
Finance Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
Authority Needed
Command
Referenced Object
SBMFNCJOB (Q)
SNDFNCIMG (Q)
WRKDEVTBL (Q)
For Object
For Library
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
*EXECUTE
Device description
WRKPGMTBL (Q)
WRKUSRTBL (Q)
1
Referenced Object
For Object
For Library
Workstation object
Workstation object
RVKWSOAUT
Workstation object
SETCSTDTA
*CHANGE
*EXECUTE
*CHANGE
*EXECUTE
EDTWSOAUT
GRTWSOAUT
*OBJMGT
2,3,4
*EXECUTE
*OBJMGT
2,3,4
*EXECUTE
*OBJMGT
2,3,4
*EXECUTE
The workstation object is an internal object that is created when you install the OS/400 Graphical
Operations feature. It is shipped with public authority of *USE.
You must be the owner or have *OBJMGT authority and the authorities being granted or revoked.
You must be the owner of have *ALLOBJ authority to grant *OBJMGT or *AUTLMGT authority.
To secure the workstation object with an authorization list or remove the authorization list, you must have
one of the following:
Own the workstation object.
Have *ALL authority to the workstation object.
Have *ALLOBJ special authority.
350
Referenced Object
For Object
For Library
CRTGSS
Source file
*USE
*EXECUTE
*READ, *ADD
*OBJEXIST
*EXECUTE
*OBJOPR
*USE
STRHOSTSVR (Q)
Command
Referenced Object
Object Type
File System
ADDLNK
Object
*STMF
QOpenSys,
"root" ,
UDFS
*FILE
18
Authority
Needed for
Object1
*OBJEXIST
*OBJMGT
QOpenSys,
*WX
"root", UDFS
*DIR
Path prefix
351
Command
Referenced Object
Object Type
File System
CHGATR
Any
All except
QSYS.LIB
*W
Any
All except
QSYS.LIB
*OBJMGT
*FILE
QSYS.LIB
*R, *W, or *X
plus
*OBJMGT
*MBR
QSYS.LIB
*X,
*OBJMGT
(authority
inherited
from parent
*FILE)
other
QSYS.LIB
*OBJMGT
Any
All
*OBJMGT
Any
directory
All
*RX
Object
All
QOpenSys,
root, UDFS
Ownership15
QSYS.LIB,
QOPT11
Ownership
or *ALLOBJ
QDLS
Ownership,
*ALL, or
*ALLOBJ
CHGAUD
CHGAUT
*OBJMGT
CHGCURDIR
CHGOWN
CHGOWN
(continued)
QOPT
*CHANGE
Optical volume
*DDIR
Any
directory
Optical volume
*DDIR
QOPT8
*X
Object
All
QSYS.LIB
*OBJEXIST
*FILE,
*LIB18,
*SBSD
QSYS.LIB
*OBJEXIST,
*OBJOPR
All
QOpenSys,
root UDFS
Ownership
and
*OBJEXIST15
All
QDLS
Ownership
or *ALLOBJ
QOPT11
Ownership
or *ALLOBJ
*DLT
*R
*USRPRF
All
*USRPRF
All
Optical volume
352
*DDIR
*ADD
8
QOPT
*CHANGE
Command
Referenced Object
Object Type
File System
Authority
Needed for
Object1
CHGPGP
Object
All
QSYS.LIB
*OBJEXIST
*FILE,
*LIB18,
*SBSD
QSYS.LIB
*OBJEXIST,
*OBJOPR
All
QOpenSys,
root UDFS
Ownership5,
All
QDLS
Ownership
or *ALLOBJ
QOPT11
Ownership
or *ALLOBJ
*USRPRF
All
*DLT
*USRPRF
All
*ADD
Optical volume
*DDIR
QOPT8
*CHANGE
*STMF
QOpenSys,
root UDFS
*W
*DOC
QDLS
*W
*STMF
QOpenSys,
root UDFS
*All or
*ALLOBJ or
Ownership
*DOC
QDLS
*All or
Ownership
*DIR18
QOpenSys,
root UDFS
*X
*FLR
QDLS
None
CHKIN
CHKIN (continued)
CHKOUT
15
Path prefix
Object
*STMF
QOpenSys,
root UDFS
*W
*DOC
QDLS
*W
Path prefix
353
Command
Referenced Object
Object Type
File System
CPY
Any
QOpenSys,
root UDFS
*R, and
*OBJMGT or
ownership
*DOC
QDLS
*RWX and
*ALL or
ownership
*MBR
QSYS.LIB
None
others
QSYS.LIB
*RX,
*OBJMGT
*DSTMF
QOPT11
*R
Any
All10
*W,
*OBJEXIST,
*OBJMGT
*DSTMF
QOPT11
*W
QOpenSys,
root, UDFS
*RX,
*OBJMGT
CPY (continued)
18
*DIR
*FILE
QSYS.LIB
*RX,
*OBJMGT
*LIB18
QSYS.LIB
*RX, *ADD
QOpenSys,
root UDFS
*WX
QDLS
*RWX
*DIR
18
*FLR
11
*WX
*USE
QOPT
*CHANGE
QOpenSys,
root UDFS
*X
*FLR
QDLS
*X
Others
QSYS.LIB
*DDIR
Source Optical volume
Target Optical volume
CPY (continued)
*DDIR
*DDIR
*DIR
18
*DDIR
Path prefix (target destination)
*LIB
18
*DIR
18
*FLR
*DDIR
Path prefix (origin object)
*DDIR
QOPT
QOPT
QOPT
11
CRTDIR
Parent directory
*WX
QOpenSys,
root UDFS
*X
QDLS
*X
QOPT
11
*X
QOPT
11
*X
*IOSYSCNFG
QOpenSys,
root UDFS
*WX
*FLR
QDLS
*CHANGE
*FILE
QSYS.LIB
*RX, *ADD
*DIR
Any
*DDIR
354
*X
QSYS.LIB
*CHRSF
18
*RX
*ADD
QOPT
11
*WX
Command
Referenced Object
Object Type
CRTDIR (continued)
Path prefix
Optical volume
*DDIR
QOPT8
*CHANGE
Object
All
QDLS
*ALL
All
All others
*OBJMGT or
ownership
ALL
QOPT11
None
CVTDIR (Q)
File System
Authority
Needed for
Object1
16
DSPAUT
DSPCURDIR
QOPT
*DDIR
Path prefix
Path prefix
*DIR18
QOpenSys,
root UDFS
*RX
*FLR
QDLS
*RX
18
18
*DDIR
DSPCURDIR
(continued)
Current directory
*DIR
18
*R
QOPT
11
QOpenSys,
root UDFS
*RX
*X
*X
*FLR
*X
QDLS
18
*DDIR
DSPLNK (continued)
*RX
*DIR
DSPLNK
*USE
Optical volume
*R
QOPT
11
*X
Optical volume
*DDIR*
QOPT
*USE
Any
Any
root,
QOpenSys,
UDFS
QSYS.LIB,
QDLS,
QOPT11
None
root,
*STMF,
QOpenSys,
*SYMLNK,
*DIR18,*BLKSF,UDFS
*SOCKET
*R
*SYMLNK
root,
QOpenSys,
UDFS
None
Optical volume
*DDIR
QOPT8
*USE
root,
QOpenSys,
UDFS
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
*DIR
18
*DDIR
*DDIR
QOPT
11
*X
*R
355
Command
DSPLNK (continued)
Referenced Object
Object Type
*DIR
18
File System
root,
QOpenSys,
UDFS
*R
*LIB18 *FILE
QSYS.LIB
*R
*FLR
QDLS
*R
*DDIR
QOPT
11
*DDIR
Parent directory of referenced object- Option 8
(Display Attributes)
18
*R
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
QOPT
11
*DDIR
18
*R
*RX
*SYMLNK
root,
QOpenSys,
UDFS
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
*DDIR
QOPT
11
*DDIR
DSPLNK (continued)
*DIR
18
*R
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
QOPT
11
*DDIR
Prefix of parent referenced object - Pattern
specified13
*DIR
18
*R
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
*DDIR
*X
root,
QOpenSys,
UDFS
*DDIR
356
*X
root,
QOpenSys,
UDFS
*DDIR
DSPLNK (continued)
*X
root,
QOpenSys,
UDFS
13
*R
root,
QOpenSys,
UDFS
*DIR
*DDIR
DSPLNK (continued)
Authority
Needed for
Object1
QOPT
11
*X
*R
Command
DSPLNK (continued)
Referenced Object
Object Type
*DIR
18
File System
root,
QOpenSys,
UDFS
*RX
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
*DDIR
QOPT
11
*DDIR
DSPLNK (continued)
18
*R
*RX
*SYMLNK
root,
QOpenSys,
UDFS
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
QOPT
11
*DDIR
DSPLNK (continued)
*DIR
18
*R
*RX
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
QOPT
11
*DDIR
Relative Path Name : Current working
directory containing object -Pattern Specified13
*DIR
18
*R
*RX
*LIB18 *FILE
QSYS.LIB
*RX
*FLR
QDLS
*RX
QOPT
11
*DDIR
DSPLNK (continued)
*RX
root,
QOpenSys,
UDFS
*DDIR
14
*X
root,
QOpenSys,
UDFS
*DDIR
14
*X
root,
QOpenSys,
UDFS
*DIR
*DDIR
14
Authority
Needed for
Object1
*DIR
18
*RX
*R
root,
QOpenSys,
UDFS
*RX
*LIB18 *FILE
QSYS.LIB
*RX
*FLR
QDLS
*RX
13
*DDIR
*DDIR
QOPT
11
*RX
*R
357
Command
DSPLNK (continued)
Referenced Object
Object Type
14
*DIR
18
root,
QOpenSys,
UDFS
*RX
*LIB18 *FILE
QSYS.LIB
*RX
*FLR
QDLS
*RX
*DDIR
ENDJRN
Object
Parent Directory
MOV
QOPT
11
*RX
*DDIR
*R
*DIR if
QOpenSys,
Subtree(*ALL) root, UDFS
*R, *X,
*OBJMGT
*DIR if
Subtree
(*NONE),
*SYMLNK,
*STMF
*R,
*OBJMGT
QOpenSys,
root. UDFS
*DTAARA18, QSYS.LIB
*DTAQ18
*OBJOPR,
*READ,
*OBJMGT
*DIR18
QOpenSys,
root, UDFS
*X
*LIB18
QSYS.LIB
*X
Path Prefix
*DIR18
QOpenSys,
root
*OBJMGT,
*W
not *DIR
QOpenSys,
root
*OBJMGT
*DOC
QDLS
*ALL
*FILE
QSYS.LIB
*OBJOPR,
*OBJMGT
*MBR
QSYS.LIB
None
other
QSYS.LIB
None
*STMF
358
File System
Authority
Needed for
Object1
QOPT
11
*W
Command
MOV (continued)
Referenced Object
Object Type
*DIR
18
QOpenSys,
root
*WX
*FLR
QDLS
*RWX
*FILE
QSYS.LIB,
root
*RX,
*OBJEXIST
others
QOpenSys,
root
*RWX
*DIR18
QSYS.LIB
*WX
*FLR
QDLS
*CHANGE
(*RWX)
*FILE
QSYS.LIB
*X, *ADD,
*DLT,
*OBJMGT
*LIB18
QSYS.LIB
*RWX
*DDIR
MOV (continued)
*LIB
18
*FLR
*DIR
MOV (continued)
18
QOPT
11
*WX
QSYS.LIB
*X, *ADD
QDLS
*X
others
*X
11
*X
*DDIR
QOPT
*STMF
QOpenSys,
root UDFS
*R,
*OBJEXIST,
*OBJMGT
*DOC
QDLS
*ALL
*MBR
QSYS.LIB
11
N/A
*RW
*DSTMF
QOPT
*STMF
QOpenSys,
root UDFS
*R,
*OBJMGT,
*OBJEXIST
*DOC
QDLS
*ALL
*DSTMF
MOV (continued)
File System
Authority
Needed for
Object1
18
QOPT
11
*RW
QOpenSys,
root UDFS
*WX
*FLR
QDLS
*X
*FILE
QSYS. LIB
ownership,
*RX,
*OBJEXIST
*DDIR
QOPT11
*WX
*DIR
Path Prefix
*DDIR
QOPT8
*CHANGE
359
Command
RMVDIR
Referenced Object
Directory
Object Type
*DIR
18
QOpenSys,
root UDFS
*OBJEXIST
*LIB18
QSYS.LIB
*RX,
*OBJEXIST
*FILE
QSYS.LIB
*OBJOPR,
*OBJEXIST
*FLR
QDLS
*ALL
*DDIR
RMVDIR (continued)
Parent directory
File System
18
QOPT
11
QOpenSys,
root UDFS
*WX
*FLR
QDLS
*X
QOPT
11
*X
*WX
Path Prefix
Optical volume
*DDIR
QOPT8
*CHANGE
Object
*DOC
QDLS
*ALL
*MBR
QSYS.LIB
*FILE
QSYS.LIB
*OBJOPR,
*OBJEXIST
*JRNRCV18
QSYS.LIB
*OBJEXIST,
*R
other
QSYS.LIB
*OBJEXIST
11
*W
*DSTMF
QOPT
any
QOpenSys,
root UDFS
*OBJEXIST
*FLR
QDLS
*X
*FILE
QSYS.LIB
*X,
*OBJEXIST
*LIB18
QSYS.LIB
*X
QOpenSys,
root UDFS
*WX
QOPT11
*WX
*DIR
18
*DDIR
360
*W
*DIR
18
RMVLNK
Authority
Needed for
Object1
Path prefix
Optical volume
*DDIR
QOPT8
*CHANGE
Command
RNM
Referenced Object
File System
Authority
Needed for
Object1
*DIR
QOpenSys,
root UDFS
*OBJMGT,
*W
Not *DIR
QOpenSys,
root UDFS
*OBJMGT
*DOC, *FLR
QDLS
*ALL
*MBR
QSYS.LIB
N/A
*FILE
QSYS.LIB
*OBJMGT,
*OBJOPR
others
QSYS.LIB
*OBJMGT
Object Type
18
Object
11
*W
QOPT
*CHANGE
*DIR
QOpenSys,
root UDFS
*WX
*FLR
QDLS
*CHANGE
(*RWX)
*FILE
QSYS.LIB
*X,
*OBJMGT
*LIB18
QSYS.LIB
*X,*UPD
*DSTMF
Optical Volume (Source and Target)
RNM (continued)
*DDIR
18
Parent directory
*DDIR
Path prefix
RST (Q)
*LIB
Object, if it exists2
18
QOPT
QOPT
11
QSYS.LIB
*WX
*X, *UPD
any
*X
QOpenSys,
root user
defined file
systemQDLS
Any
QOpenSys,
root UDFS
*W,
*OBJEXIST
QSYS.LIB
Varies
QDLS
*ALL
10
*OBJMGT,
*OBJALTER,
*READ,
*UPD
Path prefix
RST (Q) (continued)
QOpenSys,
root UDFS
*WX
*FLR
QDLS
*CHANGE
*USRPRF
*DIR
18
*OBJMGT,
*OBJALTER,
*READ,
*ADD, *UPD
QSYS.LIB
*ADD
QSYS.LIB
*RX
361
Command
RST (Q) (continued)
Referenced Object
Object Type
18
*EXECUTE
*LIB
*STMF
QOpenSys,
root UDFS
*W
*USRSPC18
QSYS.LIB
*RWX
QOpenSys,
root UDFS
*X
QSYS.LIB
*RX
*DIR
18
*LIB18
RTVCURDIR
QSYS.LIB
File System
Authority
Needed for
Object1
*DDIR
*USE
11
*X
*R
QOPT
*DDIR
QOPT
*DSTMF
QOPT11
Path prefix
18
*DIR
QOpenSys,
*RX
root,
UDFS,QDLS,
QOPT11
*DDIR
QOPT11
*RX
*FLR
QDLS
*RX
18
RTVCURDIR
(continued)
Current directory
*RX
Any
*R
*DIR
18
*DDIR
QOpenSys,
*X
root,
UDFS,QOPT11
QOPT11
18
*X
*FLR
*X
QDLS
Any
2
SAV
Object
*X
Any
*R
QOpenSys,
root UDFS
*R,
*OBJEXIST
QSYS.LIB
Varies
QDLS
*ALL
10
*OBJMGT, *R
SAV (continued)
362
Path prefix
*DEVD
QSYS.LIB
*RX
*FILE
QSYS.LIB
*USE, *ADD
*FILE
QSYS.LIB
*OBJMGT,
*USE, *ADD
*MSGQ
QSYS.LIB
*OBJOPR,
*ADD
*LIB18
QSYS.LIB
*EXECUTE
Command
Referenced Object
Object Type
File System
SAV (continued)
*STMF
QOpenSys,
root UDFS
*W
*USRSPC18
QSYS.LIB
*RWX
QOpenSys,
root UDFS
*X
QSYS.LIB
*RX
*DIR
18
*LIB18
SAV (continued)
SAVRST
*DDIR
*DDIR
*CHANGE
QOPT
11
*X
11
*WX
*RW
QOPT
*DDIR
QOPT
*DSTMF
QOPT11
STRJRN
Object
Parent Directory
WRKAUT
6, 7
*DIR if
QOpenSys,
Subtree(*ALL) root, UDFS
*R, *X,
*OBJMGT
*DIR if
QOpenSys,
subtree(*NONE),
root, UDFS
*SYMLNK,
*STMF
*R,
*OBJMGT
*DTAARA18, QSYS.LIB
*DTAQ
*OBJOPR,
*READ,
*OBJMGT
*DIR18
QOpenSys,
root, UDFS
*X
*LIB18
QSYS.LIB
*X
Path Prefix
Object
*DOC or
*FLR
QDLS
*ALL
All
not QDLS
*OBJMGT or
ownership
*DDIR and
*DSTMF
QOPT11
*NONE
Path prefix
Optical volume
*DDIR
QOPT8
*USE
363
Command
Referenced Object
Object Type
File System
WRKLNK
Any
Any
root,
QOpenSys,
UDFS,
QSYS.LIB,
QDLS,
QOPT11
None
*STMF,
*SYMLNK,
*DIR18,
*BLKSF,
*SOCKET
root,
QOpenSys,
UDFS
*R
*SYMLNK
root,
QOpenSys,
UDFS
None
Optical volume
*DDIR
QOPT8
*USE
root,
QOpenSys,
UDFS
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
WRKLNK
(continued)
*DIR
18
*DDIR
QOPT
11
*DDIR
WRKLNK
(continued)
18
*R
root,
QOpenSys,
UDFS
*R
*LIB18 *FILE
QSYS.LIB
*R
*FLR
QDLS
*R
*DIR
*DDIR
QOPT
11
*DDIR
WRKLNK
(continued)
18
*R
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
QOPT
11
*DDIR
18
*R
*RX
*SYMLNK
root,
QOpenSys,
UDFS
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
*DDIR
OS/400 Security Reference V5R2
*X
root,
QOpenSys,
UDFS
*DDIR
364
*R
root,
QOpenSys,
UDFS
*DIR
*DDIR
WRKLNK
(continued)
*X
QOPT
11
*X
*R
Command
WRKLNK
(continued)
Referenced Object
Object Type
13
*DIR
18
File System
root,
QOpenSys,
UDFS
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
*DDIR
QOPT
11
*DDIR
WRKLNK
(continued)
*DIR
18
*R
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
QOPT
11
*DDIR
Prefix of parent referenced object - Option 8
(Display Attributes)
18
*R
*RX
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
QOPT
11
*DDIR
Prefix of parent referenced object - Option 12
(Display Links)
*X
root,
QOpenSys,
UDFS
*DIR
*DDIR
WRKLNK
(continued)
*X
root,
QOpenSys,
UDFS
*DDIR
WRKLNK
(continued)
Authority
Needed for
Object1
18
*X
*R
root,
QOpenSys,
UDFS
*RX
*SYMLNK
root,
QOpenSys,
UDFS
*X
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
*DIR
*DDIR
*DDIR
QOPT
11
*X
*R
365
Command
WRKLNK
(continued)
Referenced Object
Object Type
14,
*DIR
18
File System
root,
QOpenSys,
UDFS
*RX
*LIB18 *FILE
QSYS.LIB
*X
*FLR
QDLS
*X
*DDIR
QOPT
11
*DDIR
14
*DIR
18
*R
*RX
*LIB18 *FILE
QSYS.LIB
*RX
*FLR
QDLS
*RX
QOPT
11
*DDIR
WRKLNK
(continued)
*RX
root,
QOpenSys,
UDFS
*DDIR
14
Authority
Needed for
Object1
*DIR
18
*RX
*R
root,
QOpenSys,
UDFS
*RX
*LIB18 *FILE
QSYS.LIB
*RX
*FLR
QDLS
*RX
13
*DDIR
QOPT
11
*DDIR
14
18
*RX
*R
root,
QOpenSys,
UDFS
*RX
*LIB18 *FILE
QSYS.LIB
*RX
*FLR
QDLS
*RX
*DDIR
QOPT
11
*DDIR
*RX
*R
If you have *SAVSYS special authority, you do not need the authority specified for the QSYS.LIB, QDLS,
QOpenSys, and "root" file systems.
The authority required varies by object type. See the description of the QLIRNMO API in the Information
Center (see Prerequisite and related information on page xvi for details). If the object is a database
member, see the authorities for the Rename Member (RNMM) command.
If the user issuing the command does not have *ALLOBJ authority, the user must be a member of the new
primary group.
To use an individual operation, you must have the authority required by the operation
These commands require the authority shown plus the authorities required for the DSPCURDIR command.
Optical volumes are not actual system objects. The link between the optical volume and the authorization
list used to secure the volume is maintained by the optical support function.
366
Command
Referenced Object
Object Type
File System
Authority
Needed for
Object1
See Chapter 7 of iSeries Optical Support book for information on restrictions regarding this command.
10
Authority required varies by the native command used. See the respective SAVOBJ or RSTOBJ command
for the required authority.
11
Authority required by QOPT against media formatted in Universal Disk Format (UDF).
12
13
Pattern: In some commands, an asterick (*) or a question mark (?) can be used in the last component of the
path name to search for names matching a pattern.
14
Relative path name: If a path name does not begin with a slash, the predecessor of the first component of
the path name is taken to be the current working directory of the process. For example, if a path name of
a/b is specified, and the current working directory is /home/john, then the object being accessed is
/home/john/a/b.
15
If you have *ALLOBJ special authority, you do not need the listed authority.
16
You must have have *ALLOBJ special authority to use this command.
|
|
17
In the above table, QSYS.LIB refers to independant ASP QSYS.LIB file systems as well as QSYS.LIB file
system.
18
Referenced Object
For Object
For Library
ADDDTADFN
Data dictionary
*CHANGE
*EXECUTE
File
*OBJOPR, *OBJMGT
*EXECUTE
CRTDTADCT
DLTDTADCT
Data dictionary
3
DSPDTADCT
1
LNKDTADFN
*READ, *ADD
Data dictionary
OBJEXIST, *USE
Data dictionary
*USE
*EXECUTE
Data dictionary
*USE
*EXECUTE
File
*OBJOPR, *OBJMGT
*EXECUTE
Data dictionary
*OBJOPR
*EXECUTE
STRIDD
WRKDTADCT
WRKDBFIDD
WRKDTADFN
Data dictionary
*USE
*EXECUTE
Database file
*OBJOPR
*EXECUTE
Data dictionary
*USE, *CHANGE
*EXECUTE
To use individual operations, you must have the authority required by the individual operation.
Before the dictionary is deleted, all linked files are unlinked. Refer to the LNKDTADFN command for
authority required to unlink a file.
You need use authority to the data dictionary to create a new file. No authority to the data dictionary is
needed to enter data in an existing file.
367
Referenced Object
For Object
For Library
DLTIPXD
IPX description
*OBJEXIST
*EXECUTE
DSPIPXD
IPX description
*USE
*EXECUTE
WRKIPXD
IPX description
*OBJOPR
*EXECUTE
Referenced Object
For Object
For Library
ADDSCHIDXE
Search index
*CHANGE
*USE
Panel group
*USE
*EXECUTE
CHGSCHIDX
Search index
*CHANGE
*USE
CRTSCHIDX
Search Index
DLTSCHIDX
Search index
*OBJEXIST
*EXECUTE
RMVSCHIDXE
Search index
*CHANGE
*USE
STRSCHIDX
*READ, *ADD
Search index
*USE
*EXECUTE
Search index
*ANY
*USE
WRKSCHIDXE
Search index
*USE
*USE
WRKSCHIDX
To use an individual operation, you must have the authority required by the operation .
To use this command, you must have *SECADM and *ALLOBJ special authorities.
Job Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
368
Job Commands
Authority Needed
Command
Referenced Object
BCHJOB
For Object
For Library
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE, *ADD
*EXECUTE
*READ
*EXECUTE
*USE
*EXECUTE
*OBJOPR
*EXECUTE
*READ
*EXECUTE
*READ
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Job description
9,11
CHGGRPA 4
1,2,3
CHGJOB
10
10,11
Output queue
CHGACGCDE
10
CHGPJ
CHGSYSJOB(Q)
CHGUSRTRC14
13
*OBJOPR
*EXECUTE
15
*OBJOPR, *OBJEXIST
*EXECUTE
15
*OBJOPR
*EXECUTE
*OBJOPR, *OBJMGT,
*ADD
*EXECUTE
*OBJOPR, *OBJMGT,
*ADD
*EXECUTE, *ADD
*OBJOPR
*EXECUTE, *ADD
DLYJOB
DMPUSRTRC
1
DSCJOB
DSPACTPJ
1
DSPJOB
DSPJOBTBL
DSPJOBLOG
1,5
ENDGRPJOB
ENDJOB
ENDJOBABN
ENDPJ
HLDJOB
RLSJOB
RRTJOB
RTVJOBA
Appendix D. Authority Required for Objects Used by Commands
369
Job Commands
Authority Needed
Command
Referenced Object
For Object
For Library
SBMDBJOB
Database file
*USE
*EXECUTE
Job queue
*READ
*EXECUTE
Message queue
*USE, *ADD
*EXECUTE
*READ
*EXECUTE
*USE
*EXECUTE
SBMDKTJOB
2, 12
|
|
Job description
9,11
*USE
Message queue
*USE, *ADD
*EXECUTE
*USE
*EXECUTE
*EXECUTE
*READ
*EXECUTE
*READ
*EXECUTE
*USE
*EXECUTE
Database file
*USE
*EXECUTE
Subsystem description
*USE
*EXECUTE
Program
*USE
*EXECUTE
TFRBCHJOB
Job queue
*READ
*EXECUTE
TFRGRPJOB
*USE
*EXECUTE
Job queue
*READ
*EXECUTE
*USE
*EXECUTE
User profile
10,11
10,11
Output queue
TFRJOB
10
10
TFRSECJOB
WRKACTJOB
WRKJOB
WRKSBMJOB
WRKSBSJOB
WRKUSRJOB
1
Any user can run these commands for jobs running under his own user profile. A user with job control
(*JOBCTL) special authority can run these commands for any job. If you have *SPLCTL special authority,
you do not need any authority to the job queue. However, you need authority to the library that contains
the job queue.
You must have the authority (specified in your user profile) for the scheduling priority and output priority
specified.
To change certain job attributes, even in the users own job, requires job control (*JOBCTL) special
authority. These attributes are RUNPTY, TIMESLICE, PURGE, DFTWAIT, and TSEPOOL.
To display the log for a job which was run with *ALLOBJ special authority, you must also have *JOBCTL
and *ALLOBJ special authority.
370
Job Commands
Authority Needed
Command
Referenced Object
For Object
For Library
The user profile under which the submitted job runs is checked for authority to the referenced object. The
adopted authority of the user submitting or changing the job is not used.
If the job being transferred is an interactive job, the following restrictions apply:
v The job queue where the job is placed must be associated with an active subsystem.
v The work station associated with the job must have a corresponding work station entry in the subsystem
description associated with the new subsystem.
v The work station associated with the job must not have another job associated with it that has been
suspended by means of the Sys Req (System Request) key. The suspended job must be canceled before
the Transfer Job command can run.
v The job must not be a group job.
Both the user submitting the job and the user profile under which the job will run are checked for
authority to the referenced object.
10
The user submitting the job is checked for authority to the referenced object.
11
The adopted authority of the user issuing the CHGJOB or SBMJOB command is used.
12
You must be authorized to the user profile and the job description; the user profile must also be authorized
to the job description.
13
To change certain job attributes, even in the users own job, requires job control (*JOBCTL) and all object
(*ALLOBJ) special authorities.
14
Any user can run these commands for jobs running under his own user profile. A user with job control
(*JOBCTL) special authority can run these commands for any job.
15
A user trace buffer is a user space (*USRSPC) object in library QUSRSYS by the name QPOZnnnnnn, where
nnnnnn is the job number of the job using the user trace facility.
Referenced Object
For Object
For Library
CHGJOBD
Job description
*OBJOPR, *OBJMGT
*EXECUTE
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
CRTJOBD (Q)
Job description
DLTJOBD
DSPJOBD
PRTJOBDAUT
WRKJOBD
1
*READ, *ADD
Job description
*OBJEXIST
*EXECUTE
Job description
*OBJOPR, *READ
*EXECUTE
Job description
Any
*USE
371
Command
1
CLRJOBQ
Job queue
Authority Needed
For Object
For Library
AUTCHK
*DTAAUT
Owner
*EXECUTE
CRTJOBQ
Job queue
DLTJOBQ
HLDJOBQ
Job queue
*OBJEXIST
*JOBCTL
Job queue
*EXECUTE
*YES
*JOBCTL
*YES
*JOBCTL
*YES
*JOBCTL
*DTAAUT
*OWNER
Job queue
*EXECUTE
*DTAAUT
*OWNER
*EXECUTE
WRKJOBQ
*YES
*EXECUTE
*EXECUTE
RLSJOBQ
Special
Authority
*READ, *ADD
Owner
PRTQAUT
OPRCTL
*OWNER
*EXECUTE
1
1,3
Job queue
*READ
Owner
*EXECUTE
*DTAAUT
*EXECUTE
*OWNER
*EXECUTE
1
If you have *SPLCTL special authority, you do not need any authority to the job queue but you need
authority to the library containing the job queue.
If you request to work with all job queues, your list display includes all the job queues in libraries to
which you have *EXECUTE authority.
Referenced Object
For Object
For Library
ADDJOBSCDE
Job schedule
*CHANGE
*EXECUTE
*USE
*EXECUTE
*READ
*EXECUTE
*USE
*EXECUTE
*USE, *ADD
*EXECUTE
Job description
Job queue
1,2
User profile
Message queue
372
Referenced Object
For Object
For Library
Job schedule
*CHANGE
*EXECUTE
*USE
*EXECUTE
*READ
*EXECUTE
*USE
*EXECUTE
*USE, *ADD
*EXECUTE
Job schedule
*CHANGE
*EXECUTE
Job description
Job queue
1,2
User profile
Message queue
HLDJOBSCDE
Job schedule
*CHANGE
*EXECUTE
RMVJOBSCDE
Job schedule
*CHANGE
*EXECUTE
WRKJOBSCDE
Job schedule
*USE
*EXECUTE
RLSJOBSCDE
Both the user profile adding the entry and the user profile under which the job will run are checked for
authority to the referenced object.
You must have *JOBCTL special authority or have added the entry.
To display the details of an entry (option 5 or print format *FULL), you must have *JOBCTL special
authority or have added the entry.
Journal Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
Authority Needed
For Object
Command
Referenced Object
ADDRMTJRN
Source journal
Target journal
APYJRNCHG (Q)
CHGJRN (Q)
CHGRMTJRN
For Library or
Directory
*EXEC,*ADD
Journal
*USE
*EXECUTE
Journal receiver
*USE
*EXECUTE
*RW, *OBJMGT
*OBJMGT, *USE
*EXECUTE
*OBJMGT, *USE
*EXECUTE
Journal
*OBJOPR, *OBJMGT,
*UPD
*EXECUTE
Journal if RCVSIZOPT(*MINFIXLEN) is
specified.
*OBJOPR, *OBJMGT,
*UPD, *OBJALTER
*EXECUTE
Source journal
Source journal
*USE, *OBJMGT
*EXECUTE
373
Journal Commands
Authority Needed
For Library or
Directory
Journal
*USE
*EXECUTE
Journal receiver
*USE
*EXECUTE
File
*USE
*EXECUTE
Referenced Object
CMPJRNIMG
CRTJRN
Journal
DLTJRN
For Object
Command
DSPAUDJRNE (Q)
DSPJRN
*READ, *ADD
Journal receiver
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
Journal
*OBJOPR, *OBJEXIST
*EXECUTE
Journal
*USE
*EXECUTE
*OBJEXIST, *USE
*EXECUTE
Journal receiver
*USE
*EXECUTE
File if specified
*USE
*EXECUTE
Output file
DSPJRNMNU1
ENDJRN
ENDJRNAP
Journal
*OBJOPR, *OBJMGT
*EXECUTE
File
*OBJOPR, *OBJMGT
*EXECUTE
Journal
*OBJOPR, *OBJMGT
*EXECUTE
Object
*OBJOPR, *READ,
*OBJMGT
*EXECUTE
Journal
*OBJOPR, *OBJMGT
*EXECUTE
File
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
Journal
*USE
*EXECUTE
*OBJEXIST, *USE
*EXECUTE
Journal receiver
*USE
*EXECUTE
File
*USE
*EXECUTE
Exit program
*EXECUTE
*EXECUTE
Journal
*USE
*EXECUTE
Journal receiver
*USE
*EXECUTE
ENDJRNOBJ
ENDJRNPF
JRNAP
JRNPF
2
3
RCVJRNE
RMVJRNCHG (Q)
374
Journal Commands
Authority Needed
For Object
For Library or
Directory
Journal
*USE
*EXECUTE
*OBJEXIST, *USE
*EXECUTE
Journal receiver
*USE
*EXECUTE
File
*USE
*EXECUTE
Journal
*OBJOPR, *ADD
*EXECUTE
*OBJOPR
*EXECUTE
*R
*X
Command
Referenced Object
RTVJRNE
SNDJRNE
STRJRN
STRJRNAP
Journal
*OBJOPR, *OBJMGT
*EXECUTE
File
*OBJOPR, *OBJMGT
*EXECUTE
Journal
*OBJOPR, *OBJMGT
*EXECUTE
File
*OBJOPR, *OBJMGT
*EXECUTE
Journal
*OBJOPR, *OBJMGT
*EXECUTE
Object
*OBJOPR, *READ,
*OBJMGT
*EXECUTE
Journal
*USE
*READ7
*USE
*EXECUTE
*OBJEXIST
*EXECUTE
Journal
*EXECUTE
*EXECUTE
STRJRNPF
STRJRNOBJ
WRKJRN
WRKJRNA
(Q)
Journal receiver
See the WRKJRN command (this command has the same function)
Additional authority is required for specific functions called during the operation selected. For example, to
restore an object you must have the authority required for the RSTOBJ command.
*OBJOPR and *OBJEXIST authority is required for journal receivers if the option is chosen to delete
receivers.
*READ authority to the journals library is required to display the WRKJRN menu. *EXECUTE authority to
the library is required to use an option on the menu.
You must have *ALLOBJ and *AUDIT special authorities to use this command.
375
Referenced Object
CRTJRNRCV
Journal receiver
DLTJRNRCV
Journal receiver
Journal
*OBJOPR
*EXECUTE
Journal receiver
*EXECUTE
Journal, if attached
*OBJOPR
*EXECUTE
Journal receiver
Any authority
*USE
DSPJRNRCVA
1 2 3
WRKJRNRCV , ,
For Object
For Library
*READ, *ADD
To use an individual operation, you must have the authority required by the operation .
*OBJOPR and *OBJEXIST authority is required for journal receivers if the option is chosen to delete
receivers.
*OBJOPR and a data authroity other than *EXECUTE is required for journal receivers if the option is
chosen to display the description.
Language Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CRTBNDC
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
CRTBNDCBL
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
*READ, *ADD
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
376
*READ,*ADD
Program: REPLACE(*YES)
*READ,*ADD
Binding directory
*USE
*EXECUTE
*USE
*EXECUTE
Language Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CRTBNDCL
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
CRTBNDCPP
*READ, *ADD
Program: REPLACE(*YES)
*USE
*EXECUTE
Source File
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
CRTBNDRPG
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
*READ, *ADD
*USE
*EXECUTE
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
CRTCBLMOD
*READ,*ADD
Program: REPLACE(*YES)
*READ,*ADD
Binding directory
*USE
*EXECUTE
*USE
*EXECUTE
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Module: REPLACE(*NO)
CRTCLD
*READ, *ADD
Module: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
Source file
*USE
*EXECUTE
*READ, *ADD
See General Rules on
page 311
*READ, *ADD
377
Language Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CRTCLMOD
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
CRTCLPGM
*READ, *ADD
Program: REPLACE(*YES)
*USE
*EXECUTE
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
CRTCBLPGM
(COBOL/400*
licensed program or
S/38 environment)
*READ, *ADD
Program: REPLACE(*YES)
*USE
*EXECUTE
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
CRTCMOD
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Module: REPLACE(*NO)
CRTCPPMOD
*READ, *ADD
Module: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
*READ, *ADD
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Module: REPLACE(*NO)
378
*READ, *ADD
Module: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
*READ, *ADD
*USE
*EXECUTE
Language Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CRTRPGMOD
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Module: REPLACE(*NO)
CRTRPGPGM
(RPG/400* licensed
program and S/38
environment)
*READ,*ADD
Module: REPLACE(*YES)
*READ,*ADD
*USE
*EXECUTE
Source file
*USE
*EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
CRTRPTPGM
(RPG/400 licensed
program and S/38
environment)
CRTS36CBL (S/36
environment)
CRTS36RPG
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
Source file
*USE
*EXECUTE
Program - REPLACE(*NO)
*READ, *ADD
Program - REPLACE(*YES)
*READ, *ADD
*OBJOPR
*EXECUTE
*USE
*EXECUTE
Source file
*USE
*EXECUTE
Program: REPLACE(*NO)
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
Source file
*USE
*READ, *ADD
Program: REPLACE(*NO)
CRTS36RPGR
*READ, *ADD
Program - REPLACE(*YES)
*READ, *ADD
Source file
*USE
*READ, *ADD
CRTS36RPT
*READ, *ADD
*READ, *ADD
Source file
*USE
*EXECUTE
Program: REPLACE(*NO)
Program: REPLACE(*YES)
*READ, *ADD
See General Rules on
page 311
*READ, *ADD
379
Language Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CRTSQLC OS/400
(DB2 Query Manager
and SQL
Development for
OS/400 licensed
program) 1
Source file
*OBJOPR, *READ
*EXECUTE
To Source file
*OBJOPR, *OBJMGT,
*EXIST, *READ,
*ADD, *UPDATE,
*DELETE, *EXECUTE
*ADD, *EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *OBJMGT,
*EXIST, *READ,
*ADD, *UPDATE,
*DELETE, *EXECUTE
*ADD, *EXECUTE
*OBJOPR
*EXECUTE
Source file
CRTSQLCI (DB2
Query Manager and
To Source file
SQL Development for
OS/400 licensed
program) 1
Data description specifications
Object: REPLACE(*NO)
*READ, *ADD
Object: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *OBJMGT,
*EXIST, *READ,
*ADD, *UPDATE,
*DELETE, *EXECUTE
*ADD, *EXECUTE
*OBJOPR
*EXECUTE
Source file
CRTSQLCBL (DB2
Query Manager and
To Source file
SQL Development for
OS/400 licensed
program) 1
Data description specifications
Program: REPLACE(*NO)
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *OBJMGT,
*EXIST, *READ,
*ADD, *UPDATE,
*DELETE, *EXECUTE
*ADD, *EXECUTE
*OBJOPR
*EXECUTE
Source file
CRTSQLCBLI (DB2
Query Manager and
To Source file
SQL Development for
OS/400 licensed
program) 1
Data description specifications
Object: REPLACE(*NO)
380
*READ, *ADD
Object: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
Language Commands
Authority Needed
Command
Referenced Object
Source file
CRTSQLCPPI (DB2
Query Manager and
To Source file
SQL Development for
OS/400 licensed
program) 1
Data description specifications
For Object
For Library
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *OBJMGT,
*EXIST, *READ,
*ADD, *UPDATE,
*DELETE, *EXECUTE
*ADD, *EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *OBJMGT,
*EXIST, *READ,
*ADD, *UPDATE,
*DELETE, *EXECUTE
*ADD, *EXECUTE
*OBJOPR
*EXECUTE
Source file
CRTSQLFTN (DB2
Query Manager and
To Source file
SQL Development for
OS/400 licensed
program) 1
Data description specifications
Program: REPLACE(*NO)
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *OBJMGT,
*EXIST, *READ,
*ADD, *UPDATE,
*DELETE, *EXECUTE
*ADD, *EXECUTE
*OBJOPR
*EXECUTE
Source file
CRTSQLPLI (DB2
Query Manager and
To Source file
SQL Development for
OS/400 licensed
program) 1
Data description specifications
Program: REPLACE(*NO)
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *OBJMGT,
*EXIST, *READ,
*ADD, *UPDATE,
*DELETE, *EXECUTE
*ADD, *EXECUTE
*OBJOPR
*EXECUTE
Source file
CRTSQLRPG (DB2
Query Manager and
To Source file
SQL Development for
OS/400 licensed
program) 1
Data description specifications
Program: REPLACE(*NO)
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
381
Language Commands
Authority Needed
Command
Referenced Object
Source file
CRTSQLRPGI (DB2
Query Manager and
To Source file
SQL Development for
OS/400 licensed
program) 1
Data description specifications
For Object
For Library
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *OBJMGT,
*EXIST, *READ,
*ADD, *UPDATE,
*DELETE, *EXECUTE
*ADD, *EXECUTE
*OBJOPR
*EXECUTE
Object: REPLACE(*NO)
CVTRPGSRC
CVTSQLCPP
*READ, *ADD
Object: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
Source file
*USE
*EXECUTE
Output file
*OBJOPR, *OBJMGT,
*ADD
*EXECUTE
Log file
*OBJOPR, *OBJMGT,
*ADD
*EXECUTE
Source file
*OBJOPR, *READ
*EXECUTE
To Source file
*OBJOPR, *OBJMGT,
*EXIST, *READ,
*ADD, *UPDATE,
*DELETE, *EXECUTE
*ADD, *EXECUTE
*OBJOPR
*EXECUTE
Program: REPLACE(*NO)
*READ, *ADD
Program: REPLACE(*YES)
*READ, *ADD
*USE
*EXECUTE
ENDCBLDBG
Program
(COBOL/400 licensed
program or S/38
environment)
*CHANGE
*EXECUTE
ENTCBLDBG (S/38
environment)
Program
*CHANGE
*EXECUTE
DLTCLD
Locale object
RTVCLDSRC
Locale object
*USE
*EXECUTE
To-file
RUNSQLSTM
(SQL/400 licensed
program) 1
Source file
*OBJOPR, *READ
*EXECUTE
STRCBLDBG
Program
*CHANGE
*EXECUTE
STRREXPRC
Source file
*USE
*EXECUTE
Exit program
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Printer file
*USE
*EXECUTE
382
Language Commands
Authority Needed
Command
1
Referenced Object
For Object
For Library
The DB2 Universal Database for iSeries topic in the Information Center contains more information about
security requirements for structured query language (SQL) statements. See Prerequisite and related
information on page xvi for details.
Library Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
Authority Needed
Referenced Object
ADDLIBLE
Library
*USE
CHGCURLIB
*USE
Library
*OBJMGT
CHGLIBL
*USE
CHGSYSLIBL (Q)
*USE
CHGLIB
CLRLIB
For Object
Command
*OBJEXIST
*USE
From-Library
*USE
To-library, if it exists
*USE, *ADD
CHKOBJ, CRTDUPOBJ
commands
*USE
*USE
CRTLIB
Library
DLTLIB
*OBJEXIST
*USE, *OBJEXIST
Library
Objects in the library
*READ
5
DSPLIBD
Library
EDTLIBL
*USE
Appendix D. Authority Required for Objects Used by Commands
383
Library Commands
Authority Needed
Command
Referenced Object
RCLLIB
Library
RSTLIB
(Q)
For Object
*USE, *OBJEXIST
Media definition
*USE
*EXECUTE
Library saved if
VOL(*SAVVOL) is specified
Every object being restored
over in the library
(Q) (continued)
RSTS36LIBM
RTVLIBD
384
*EXECUTE
*USE
*OBJEXIST
RSTLIB
*USE
*EXECUTE
6
*EXECUTE
*EXECUTE
Save file
*USE
*EXECUTE
12
*R
N/A
*X
N/A
Optical volume11
*USE
From-file
*USE
*EXECUTE
To-file
*CHANGE
*EXECUTE
To-library
*CHANGE
*EXECUTE
*USE
*EXECUTE
Library
Library Commands
Authority Needed
For Library Being Acted
On
Command
Referenced Object
For Object
SAVLIB
*OBJEXIST
Media definition
*USE
*EXECUTE
*USE, *ADD
*EXECUTE
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
*USE
*EXECUTE
QSYS/QASAVOBJ field
reference file, if output file
is specified and does not
exist
*USE
*EXECUTE
*EXECUTE
SAVLIB (continued)
SAVS36LIBM
WRKLIB
10.
*READ, *EXECUTE
Optical File12
*RW
N/A
*WX
N/A
*X
N/A
*RWX
N/A
Optical volume11
*CHANGE
*OBJOPR, *OBJMGT
*EXECUTE
*OBJOPR
*EXECUTE
*ADD
*READ, *ADD
*ADD, *DLT
*EXECUTE
From-library
*USE
Library
*USE
385
Library Commands
Authority Needed
Command
Referenced Object
For Object
The authority needed for the library being acted upon is indicated in this column. For example, to add the
library CUSTLIB to a library list using the ADDLIBLE command requires Use authority to the CUSTLIB
library.
The authority needed for the QSYS library is indicated in this column, because all libraries are in QSYS
library.
If object existence is not found for some objects in the library, those objects are not deleted, and the library
is not completely cleared and deleted. Only authorized objects are deleted.
All restrictions that apply to the CRTDUPOBJ command, also apply to this command.
If you do not have authority to an object in the library, the text for the object says *NOT AUTHORIZED.
If you have *SAVSYS special authority, you do not need the authority specified.
You must have *AUDIT special authority to change the CRTOBJAUD value for a library. *OBJMGT is not
required if you change only the CRTOBJAUD value. *OBJMGT is required if you change the CRTOBJAUD
value and other values.
You must have *AUDIT special authority to specify a CRTOBJAUD value other than *SYSVAL.
10
You must have the authority required by th operation to use an individual operation.
11
Optical volumes are not actual system objects. The link between the optical volume and the authorization
list used to secure the volume is maintained by the optical support function.
12
This authority check is only made when the Optical media format is Universal Disk Format.
13
This authority check is only made when you are clearing the optical volume.
14
Referenced Object
For Object
For Library
ADDLICKEY (Q)
Output file
*USE
*EXECUTE
DSPLICKEY (Q)
Output file
RMVLICKEY (Q)
Output file
*CHANGE
*EXECUTE
386
(Q)
RSTLICPGM
1,2
(Q)
SAVLICPGM
1,2
(Q)
DLTLICPGM
Referenced Object
For Object
For Library
WRKLICINF command
*USE
*EXECUTE
DSPTM
INZSYS (Q)
WRKLICINF (Q)
1
Some licensed programs can be deleted, saved, or restored only if you are enrolled in the system
distribution directory.
If deleting, restoring, or saving a licensed program that contains folders, all restrictions that apply to the
DLTDLO command also apply to this command.
To use individual operations, you must have the authority required by the individual operation.
Referenced Object
For Object
For Library
Line description
*USE
Line description
CHGLINASC
CHGLINBSC
*USE
CHGLINDDI
Line description
CHGLINETH
Line description
CHGLINFAX
Line description
Line description
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Line description
CHGLINFR
2
2
CHGLINIDLC
*EXECUTE
*EXECUTE
Line description
CHGLINSDLC
Line description
CHGLINTDLC
Line description
Line description
Line description
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
CHGLINNET
CHGLINTRN
CHGLINX25
387
CHGLINWLS
CRTLINASC
CRTLINBSC
CRTLINDDI
Referenced Object
For Object
Line description
Program (INZPGM)
*USE
*EXECUTE
*USE
*EXECUTE
Line description
CRTLINETH
*READ, *ADD
*USE
CRTLINFAX
*READ, *ADD
Line description
*READ, *ADD
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Controller description
CRTLINFR
*READ, *ADD
Line description
*READ, *ADD
*USE
Line description
CRTLINIDLC
CRTLINNET
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*READ, *ADD
*USE
*EXECUTE
*USE
*EXECUTE
Line description
CRTLINSDLC
CRTLINTDLC
*READ, *ADD
*USE
Line description
Controller description (WSC and CTL)
CRTLINTRN
*USE
*EXECUTE
*READ, *ADD
*USE
Line description
388
*EXECUTE
*READ, *ADD
Line description
2
*EXECUTE
*READ, *ADD
Line description
2
*EXECUTE
Line description
Line description
For Library
*EXECUTE
*READ, *ADD
*USE
*EXECUTE
*USE
*EXECUTE
Referenced Object
For Object
For Library
*USE
*EXECUTE
*USE
*EXECUTE
Line description
CRTLINWLS
*READ, *ADD
*USE
*EXECUTE
*USE
*EXECUTE
Line description
*READ, *ADD
*USE
*EXECUTE
Program (INZPGM)
*USE
*EXECUTE
DLTLIND
Line description
*OBJEXIST
*EXECUTE
DSPLIND
Line description
*USE
*EXECUTE
ENDLINRCY
Line description
*OBJOPR
*EXECUTE
Line description
*OBJOPR
*EXECUTE
Line description
*OBJOPR
*EXECUTE
PRTCMNSEC 2, 3
RSMLINRCY
WRKLIND
To use individual operations, you must have the authority required by the individual operation.
DSPLANADPP
DSPLANSTS
RMVLANADPT (Q)
RMVLANADPI
WRKLANADPT
Locale Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CRTLOCALE
Source file
*USE
*USE, *ADD
DLTLOCALE
Locale
*OBJEXIST
*USE
389
STRMSF (Q)
Media Commands
Authority Needed
Command
Referenced Object
For Object
For Library
*USE
*EXECUTE
CFGDEVMLB (Q)
*USE
*EXECUTE
CHGDEVMLB (Q)
*USE
*EXECUTE
CHGJOBMLBA
*CHANGE
*EXECUTE
CHGTAPCTG
*USE
*EXECUTE
CHKDKT
*USE
*EXECUTE
CHKTAP
*USE
*EXECUTE
CLRDKT
*USE
*EXECUTE
CRTTAPCGY
*USE
*EXECUTE
DLTDKTLBL
*USE
*EXECUTE
DLTMEDDFN
Media definition
*OBJEXIST
*EXECUTE
DLTTAPCGY
*USE
*EXECUTE
DMPTAP
*USE
*EXECUTE
DSPDKT
*USE
*EXECUTE
DSPTAP
*USE
*EXECUTE
DSPTAPCGY
*USE
*EXECUTE
DSPTAPCTG
*USE
*EXECUTE
DSPTAPSTS
*USE
*EXECUTE
DUPDKT
*USE
*EXECUTE
DUPTAP
*USE
*EXECUTE
INZDKT
*USE
*EXECUTE
INZTAP
*USE
*EXECUTE
RMVTAPCTG
*USE
*EXECUTE
RNMDKT
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
ADDTAPCTG
1
SETTAPCGY
WRKMLBRSCQ
WRKMLBSTS
WRKTAPCTG
(Q)
To use individual operation, you must have the authority required by the operation.
To change the session media library attributes, you must have *CHANGE authority to the Tape Library
description.
390
Referenced Object
For Object
For Library
CHGMNU
Menu
*CHANGE
*USE
CRTMNU
Source file
*USE
*EXECUTE
Menu: REPLACE(*NO)
*READ, *ADD
Menu: REPLACE(*YES)
CRTPNLGRP
CRTS36MNU
*READ, *ADD
*READ, *ADD
*READ, *ADD
Source file
*USE
*EXECUTE
Include file
*USE
*EXECUTE
Menu: REPLACE(*NO)
*READ, *ADD
Menu: REPLACE(*YES)
*READ, *ADD
Source file
*USE
*EXECUTE
*OBJOPR, *OBJEXIST
*EXECUTE
*OBJOPR, *OBJMGT,
*OBJEXIST, *ADD
*READ, *ADD
*OBJOPR, *OBJEXIST
*EXECUTE
*OBJOPR, *OBJEXIST
*EXECUTE
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
DLTMNU
Menu
*OBJOPR, *OBJEXIST
*EXECUTE
DLTPNLGRP
Panel group
*OBJEXIST
*EXECUTE
DSPMNUA
Menu
*USE
*USE
GO
Menu
*USE
*USE
*USE
*EXECUTE
*USE
*USE
*EXECUTE
Menu
Any
*USE
Panel group
Any
*EXECUTE
|
WRKMNU
WRKPNLGRP
1
To use an individual operation, you must have the authority required by the operation .
391
Message Commands
Message Commands
Authority Needed
Command
Referenced Object
For Object
For Library
DSPMSG
Message queue
*USE
*USE
*USE, *ADD
*USE
*USE, *DLT
*USE
Message queue
*USE
*EXECUTE
*USE, *DLT
*EXECUTE
RMVMSG
Message queue
*OBJOPR, *DLT
*EXECUTE
RTVMSG
Message file
*USE
*EXECUTE
SNDBRKMSG
*OBJOPR, *ADD
*EXECUTE
SNDMSG
Message queue
*OBOPR, *ADD
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
Message queue
*OBJOPR, *ADD
*EXECUTE
*USE
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
Message queue
*USE, *ADD
*EXECUTE
*EXECUTE
Message queue
*OBJOPR, *ADD
*EXECUTE
*USE
*EXECUTE
Message queue
*USE
*USE
*USE, *ADD
*USE
*USE, *DLT
*USE
RCVMSG
SNDPGMMSG
SNDRPY
SNDUSRMSG
WRKMSG
Referenced Object
For Object
For Library
ADDMSGD
Message file
*USE, *ADD
*EXECUTE
CHGMSGD
Message file
*USE, *UPD
*EXECUTE
DSPMSGD
Message file
*USE
*EXECUTE
Message file
*OBJOPR, *DLT
*EXECUTE
Message file
*USE
*EXECUTE
RMVMSGD
WRKMSGD
1
392
To use individual operations, you must have the authority required by the individual operation.
Referenced Object
For Object
For Library
CHGMSGF
Message file
*USE, *DLT
*EXECUTE
CRTMSGF
Message file
DLTMSGF
Message file
*OBJEXIST
*EXECUTE
DSPMSGF
Message file
*USE
*EXECUTE
MRGMSGF
From-message file
*USE
*EXECUTE
To-message file
*EXECUTE
Replace-message file
*USE, *ADD
*EXECUTE
Message file
Any authority
*USE
WRKMSGF
1
1.
*READ, *ADD
To use an individual operation, you must have the authority required by the operation .
Referenced Object
For Object
For Library
CHGMSGQ
Message queue
*USE, *DLT
*EXECUTE
CLRMSGQ
Message queue
*OBJOPR, *DLT
*EXECUTE
CRTMSGQ
Message queue
DLTMSGQ
Message queue
*READ, *ADD
*OBJEXIST, *USE,
*DLT
DSPLOG
WRKMSGQ
1
*EXECUTE
*EXECUTE
Message queue
Any authority
*USE
To use an individual operation, you must have the authority required by the operation .
Migration Commands
Authority Needed
Command
Referenced Object
For Object
For Library
RCVMGRDTA
File
*ALL
*READ, *ADD
Device
*CHANGE
*EXECUTE
File
*ALL
*READ, *ADD
Device
*CHANGE
*EXECUTE
SNDMGRDTA
393
Migration Commands
Authority Needed
Command
Referenced Object
For Object
For Library
ANZS34OCL
ANZS36OCL
CHGS34LIBM
CHKS36SRCA
CVTBASSTR
CVTBASUNF
CVTBGUDTA
CVTS36CFG
CVTS36FCT
CVTS36JOB
CVTS36QRY
CVTS38JOB
GENS36RPT
GENS38RPT
MGRS36
MGRS36APF
MGRS36CBL
MGRS36DFU
MGRS36DSPF
MGRS36ITM
MGRS36LIB
MGRS36MNU
MGRS36MSGF
MGRS36QRY 1
MGRS36RPG
MGRS36SEC
MGRS38OBJ
MIGRATE
QMUS36
RESMGRNAM
RSTS38AUT
STRS36MGR
STRS38MGR
You must have *ALLOBJ special authority and have OS/400 option 4 installed.
Referenced Object
For Object
For Library
Mode description
Mode description
*READ, *ADD
CHGSSNMAX
Device description
*OBJOPR
*EXECUTE
DLTMODD
Mode description
*OBJEXIST
*EXECUTE
DSPMODD
Mode description
*USE
*EXECUTE
DSPMODSTS
Device
*OBJOPR
*EXECUTE
Mode description
*OBJOPR
*EXECUTE
Device description
*OBJOPR
*EXECUTE
Device description
*OBJOPR
*EXECUTE
Mode description
*OBJOPR
*EXECUTE
ENDMOD
STRMOD
WRKMODD
To use individual operations, you must have the authority required by the individual operation.
Module Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CHGMOD
Module
*OBJMGT, *USE
*USE
*OBJMGT, *USE
*OBJMGT, *USE
*OBJMGT, *USE
*USE, *ADD,
*DELETE
DLTMOD
Module
*OBJEXIST
*EXECUTE
DSPMOD
Module
*USE
*EXECUTE
394
Module Commands
Authority Needed
Command
RTVBNDSRC
|
|
WRKMOD
1
Referenced Object
For Object
For Library
Module
*USE
*EXECUTE
*USE
*EXECUTE
*EXECUTE
*OBJOPR, *ADD
*EXECUTE
*OBJOPR, *OBJMGT,
*ADD
*EXECUTE, *READ,
*ADD
*EXECUTE, *READ,
*ADD
*EXECUTE
*EXECUTE
*EXECUTE
Module
*USE
Any authority
To use an individual operation, you must have the authority required by the operation
DLTNTBD
DSPNTBD
WKRNTBD
Referenced Object
For Object
For Library
NetBIOS description
NetBIOS description
*EXECUTE
NetBIOS description
*OBJEXIST
*EXECUTE
NetBIOS description
*USE
*EXECUTE
NetBIOS description
*OBJOPR
*EXECUTE
To use an individual operation, you must have the authority required by the operation
Network Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
395
Network Commands
Authority Needed
Command
Referenced Object
For Object
ADDNETJOBE (Q)
*USE
APING
Device description
*CHANGE
Device description
*CHANGE
AREXEC
CHGNETA (Q)
CHGNETJOBE (Q)
DLTNETF
For Library
*USE
Output file
*OBJMGT, *USE
*EXECUTE, *ADD
*USE
DSPNETA
RCVNETF
*EXECUTE
*USE
RUNRMTCMD
Device description
*CHANGE
SNDNETF
*USE
*EXECUTE
SNDNETMSG to a
local user
Message queue
*OBJOPR, *ADD
*EXECUTE
VFYAPPCCNN
Device description
*CHANGE
QUSRSYS/QANFNJE
*USE
RTVNETA
WRKNETF
2,3
WRKNETJOBE
*EXECUTE
A user can run these commands on the users own network files or on network files owned by the users
group profile. *ALLOBJ special authority is required to process network files for another user.
To use an individual operation, you must have the authority required by that operation.
To change some network attributes, you must have *ALLOBJ and *IOSYSCFG special authorities.
396
1,2,3
Referenced Object
Object Type
File System
Authority
Needed for
Object
/dev/QASPxx
*DIR
"root"
*RWX
/dev/QASPxx/yyy
*BLKSF
"root"
*R
dir_to_be_ mounted_over
*DIR
"root"
*RWX
Command
CHGNFSEXP
1,4
DSPMFSINF
ENDNFSSVR
EXPORTFS
MOUNT
1,2,3
RMVMFS
Referenced Object
Object Type
File System
some_dirs
*DIR
"root"
*RX
/etc
*DIR
"root"
*RWX
/etc/exports
*STMF
"root"
*RWX
/etc/netgroup
*STMF
"root"
*RWX
some_dirs
*DIR
"root"
*RX
some_dirs
*DIR
"root"
*RX
/etc
*DIR
"root"
*RWX
/etc/exports
*STMF
"root"
*RWX
/etc/netgroup
*STMF
"root"
*RWX
/dev/QASPxx
*DIR
"root"
*RWX
none
1,4,5
RLSIFSLCK
STATFS
1,4,5
Authority
Needed for
Object
1,4
/dev/QASPxx/yyy
*BLKSF
"root"
*R
dir_to_be_ mounted_over
*DIR
"root"
*RWX
some_dirs
*DIR
"root"
*RX
some_stmf
*STMF
"root"
*RWX
some_dirs
*DIR
"root"
*RX
some_dirs
*DIR
"root"
*RX
*DIR
"root"
*RX
STRNFSSVR
none
UNMOUNT
some_dirs
QASPxx is either 01 (system asp) or 02-16 based on which user asp is needed. This is the directory that
contains the *BLKSF that is being mounted.
The directory that is mounted over (dir_to_be_mounted_over) is any IFS directory that can be mounted
over.
You must provide a path to some object. You must have *RX authority for all directories in that path.
You must have *RX authority to the /etc/exports stream file and the directories in the /etc/exports path.
You must provide a path to some *STMF. You must have *RX authority for all directories in that path.
You must have update (*RWX) authority to the stream file for which you are releasing locks.
CHGNWIISDN
CRTNWIFR
Referenced Object
For Object
For Library
*USE
*EXECUTE
*READ, *ADD
*USE
*EXECUTE
397
DLTNWID
DSPNWID
WRKNWID
Referenced Object
For Object
For Library
*USE
*EXECUTE
*USE
*EXECUTE
*OBJEXIST
*EXECUTE
*USE
*EXECUTE
*OBJOPR
*EXECUTE
To use the individual operations, you must have the authority required by the individual operation.
Referenced Object
Object Type
File System
Authority
Needed for
Object
ADDNWSSTGL 2
Path (/QFPNWSSTG)
*DIR
"root"
*X
*DIR
"root"
*WX
*FILE
"root"
*RW
*NWSD
QSYS.LIB
*CHANGE,
*OBJMGT
User Profile
*USRPRF
CHGNWSUSRA 4
*OBJMGT,
*USE
CRTNWSSTG
*DIR
"root"
*WX
DLTNWSSTG
Path (/QFPNWSSTG)
*DIR
"root"
*WX
*DIR
"root"
*RWX,
*OBJEXIST
*FILE
"root"
*OBJEXIST
*DIR
"root"
*X
*FILE
"root"
*R
Path (/QFPNWSSTG)
*DIR
"root"
*X
*DIR
"root"
*WX
*FILE
"root"
*RW
*NWSD
QSYS.LIB
*CHANGE,
*OBJMGT
*DIR
"root"
*X
*FILE
"root"
*R
DSPNWSSTG
RMVNWSSTGL
WRKNWSSTG
398
DSPNWSALS
DSPNWSSSN
DSPNWSSTC
DSPNWSUSR
DSPNWSUSRA
SBMNWSCMD (Q)
SNDNWSMSG
WRKNWSALS
WRKNWSENR
WRKNWSSSN
WRKNWSSTS
3
Command
Referenced Object
Object Type
File System
Authority
Needed for
Object
You must have *SECADM special authority to specify a value other than *NONE for the NDSTREELST and
the NTW3SVRLST paramaters.
CHGNWSD
CRTNWSD
DLTNWSD
DSPNWSD
1
WRKNWSD
Referenced Object
For Object
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*OBJEXIST
*EXECUTE
*USE
*EXECUTE
*OBJOPR
*EXECUTE
To use an individual operation, you must have the authority required by the operation
Referenced Object
For Object
For Library
ADDNODLE
Node list
*OBJOPR, *ADD
*EXECUTE
CRTNODL
Node list
DLTNODL
Node list
*OBJEXIST
*EXECUTE
RMVNODLE
Node list
*OBJOPR, *READ,
*DLT
*EXECUTE
WRKNODL 1
Node list
*USE
*USE
WRKNODLE
Node list
*USE
*EXECUTE
*READ, *ADD
To use the individual operations, you must have the authority required by the individual operation.
399
ADDACC (Q)
DSPACC
DSPACCAUT
DSPUSRPMN
RVKUSRPMN 1,2
WRKDOCLIB 4
WRKDOCPRTQ
You must have *ALLOBJ special authority to grant or revoke access code authority or document authority
for other users.
Access is restricted to documents, folders, and mail that are not personal.
The access code must be defined to the system (using the Add Access Code (ADDACC) command) before
you can grant access code authority. The user being granted access code authority must be enrolled in the
system distribution directory.
Additional authorities are required for specific functions called by the operations selected. The user also
needs additional authorities for any commands called during a specific function.
Referenced Object
For Object
For Library
CVTEDU
STREDU
Referenced Object
For Object
For Library
QUSRSYS/QEZBACKUPL *USRIDX
*CHANGE
*EXECUTE
PWRDWNSYS *CMD
*USE
*EXECUTE
PWRDWNSYS *CMD
*USE
*EXECUTE
DSPBCKSTS
QUSRSYS/QEZBACKUPL *USRIDX
*USE
*EXECUTE
DSPBCKUP
QUSRSYS/QEZBACKUPL *USRIDX
*USE
*EXECUTE
DSPBCKUPL
QUSRSYS/QEZBACKUPL *USRIDX
*USE
*EXECUTE
QUSRSYS/QEZBACKUPF *USRIDX
*USE
*EXECUTE
CHGBCKUP
CHGCLNUP
CHGPWRSCD
CHGPWRSCDE
DSPPWRSCD
EDTBCKUPL
ENDCLNUP
*EXECUTE
1
PRTDSKINF (Q)
400
QUSRSYS/QEZBACKUPL *USRIDX
*CHANGE
*EXECUTE
QUSRSYS/QEZBACKUPF *USRIDX
*CHANGE
*EXECUTE
ENDJOB *CMD
*USE
*EXECUTE
*USE
*EXECUTE
Referenced Object
For Object
For Library
RTVBCKUP
QUSRSYS/QEZBACKUPL *USRIDX
*USE
*EXECUTE
DSPPWRSCD command
*USE
*EXECUTE
QUSRSYS/QEZBACKUPL *USRIDX
*USE
*EXECUTE
QUSRSYS/QEZBACKUPF *USRIDX
*USE
*EXECUTE
*USE
*EXECUTE
*USE
Job queue
*USE
RTVCLNUP
RTVDSKINF (Q)
RTVPWRSCDE
RUNBCKUP
STRCLNUP4
*EXECUTE
Optical Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
Table 139.
Authority Needed
Command
Referenced Object
Object
Library
ADDOPTCTG (Q)
Optical Device
*USE
*EXECUTE
ADDOPTSVR (Q)
Server CSI
*USE
*EXECUTE
Optical Device
*W
N/A
N/A
Optical Device
*USE
N/A
N/A
Server CSI
*USE
N/A
N/A
CHGDEVOPT
Optical Volume
CHGOPTA (Q)
CHGOPTVOL
401
Optical Commands
Table 139. (continued)
Authority Needed
Command
Referenced Object
Object
Library
Optical Volume
CPYOPT
Optical Device
*X
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
*WX
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
*X
N/A
N/A
*X
N/A
N/A
*R
N/A
N/A
*RX
N/A
N/A
*WX
N/A
N/A
*W
N/A
N/A
N/A
N/A
*WX
N/A
N/A
Source files
*R
N/A
N/A
*W
N/A
N/A
N/A
N/A
CRTDEVOPT4
Optical Device
*EXECUTE
CVTOPTBKU
Optical Device
*EXECUTE
*ALL
CPYOPT (continued)
CPYOPT (continued)
COPYOPT
(continued)
402
*W
*USE
Optical Commands
Table 139. (continued)
Authority Needed
Command
Referenced Object
Object
Library
Optical Volume
DSPOPT
*X
N/A
N/A
*R
N/A
N/A
Optical Device
*EXECUTE
*USE
Server CSI
*USE
*EXECUTE
DSPOPTSVR
Server CSI
*USE
*EXECUTE
DUPOPT
Optical Device
*USE
*EXECUTE
DSPOPTLCK
INZOPT
*RWX
N/A
N/A
Optical Device
*USE
*EXECUTE
*ALL
RCLOPT (Q)
Optical Device
*USE
*EXECUTE
RMVOPTCTG (Q)
Optical Device
*USE
*EXECUTE
RMVOPTSVR (Q)
Server CSI
*USE
*EXECUTE
Optical Device
*USE
*EXECUTE
Server CSI
*USE
*EXECUTE
Optical Device
*USE
*EXECUTE
Server CSI
*USE
*EXECUTE
Optical Device
*USE
*EXECUTE
Server CSI
*USE
*EXECUTE
Optical Device
*USE
*EXECUTE
WRKHLDOPTF
WRKOPTDIR
WRKOPTF
WRKOPTVOL
*USE
*USE
*USE
Optical volumes are not actual system objects. The link between the optical volume and the authorization
list used to secure the volume is maintained by the optical support function.
There are seven options that can be invoked from the optical utilities that are not commands themselves.
These options and their required authorities to the optical volume are shown below.
Delete File: *CHANGE
Rename File: *CHANGE
Delete Directory: *CHANGE
Create Directory: *CHANGE
Rename Volume: *ALL
Release Held Optical File: *CHANGE
Save Held Optical File: *USE - Source Volume, *Change - Target Volume
Authorization list management authority to the authorization list currently securing the optical volume is
needed to change the authorization list used to secure the volume.
This authority check is only made when the Optical media format is Universal Disk Format (UDF).
403
Optical Commands
CHGOUTQ
Authority Needed
Referenced
Object
For Object
For Library
Data queue
*READ
*EXECUTE
Output queue
*OBJMGT,
*EXECUTE
*READ, *ADD,
*DLT
Owner
*EXECUTE
CLROUTQ
Output queue
*EXECUTE
Data queue
*READ
HLDOUTQ
RLSOUTQ
Output queue
*OBJEXIST
Output queue
Output queue
*EXECUTE
Output queue
Output queue
*YES
*JOBCTL
*YES
*JOBCTL
*YES
*JOBCTL
*OWNER
*EXECUTE
*DTAAUT
*OWNER
*READ
*EXECUTE
*EXECUTE
WRKOUTQD
*JOBCTL
*DTAAUT
*EXECUTE
WRKOUTQ
*YES
*EXECUTE
1,3
*JOBCTL
*OWNER
*EXECUTE
PRTQAUT
*YES
*DTAAUT
*READ, *ADD
Owner
4
*JOBCTL
*EXECUTE
Output queue
DLTOUTQ
*YES
*OWNER
*EXECUTE
CRTOUTQ
Special
Authority
*DTAAUT
*EXECUTE
1
OPRCTL
*READ
*EXECUTE
1,3
*EXECUTE
1
If you have *SPLCTL special authority, you do not need authority to the output queue. You do need
*EXECUTE authority, however, to the library for the outqueue.
If you request to work with all output queues, your list display includes all the output queues in libraries
to which you have *EXECUTE authority.
404
Package Commands
Package Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CRTSQLPKG
Program
*OBJOPR, *READ
*EXECUTE
*OBJOPR, *READ,
*ADD, *EXECUTE
*OBJOPR, *OBJMGT,
*OBJEXIST, *READ
*OBJOPR, *READ,
*ADD, *EXECUTE
DLTSQLPKG
Package
*OBJEXIST
*EXECUTE
PRTSQLINF
Package
*OBJOPR, *READ
*EXECUTE
Program
*OBJOPR, *READ
*EXECUTE
Service program
*OBJOPR, *READ
*EXECUTE
STRSQL
Performance Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-Supplied user profiles are authorized to the
command. The security officer can grant *USE to others.
Authority Needed
Command
Referenced Object
ADDPEXDFN (Q)
ADDPEXFTR (Q)
ANZACCGRP (Q)
For Object
PGM Library
*EXECUTE
PGMTRG Library
*EXECUTE
PGMFTR Library
*EXECUTE
JVAFTR Path
*X for directory
PATHFTR Path
*X for directory
QPFR/QPTPAGA0 *PGM
*USE
Model library
ANZBESTMDL (Q)
ANZDBF (Q)
ANZDBFKEY (Q)
Job description
*USE
*EXECUTE
QPFR/QCYRBCPP *PGM
*USE
*EXECUTE
QPFR/QCYMBREX *PGM
*USE
*EXECUTE
QPFR/QCYRBMN *PGM
*USE
*EXECUTE
*EXECUTE
Job description
*USE
*EXECUTE
QPFR/QCYRBMN *PGM
*USE
*EXECUTE
Job description
*USE
*EXECUTE
QPFR/QPTANZKC *PGM
*USE
*EXECUTE
*EXECUTE
*EXECUTE, *ADD
For Library
QPFR/QPTANZPC *PGM
2
Performance data
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*ADD, *READ
405
Performance Commands
Authority Needed
Command
ANZPFRDTA (Q)
Referenced Object
For Object
For Library
QPFR/QACVPP *PGM
*USE
*EXECUTE
*ADD, *READ
Performance data
ANZPFRDT2 (Q)
CHGFCNARA (Q)
CHGGPHFMT (Q)
CHGGPHPKG (Q)
CHGJOBTYP (Q)
*USE
*EXECUTE
QAPTAPGP *FILE
*CHANGE
*EXECUTE
*USE
*EXECUTE
QPFR/QPTAGRP *PGM
*USE
*EXECUTE
QPFR/QPTAGRPD *PGM
*USE
*EXECUTE
QAPGGPHF *FILE
*CHANGE
*EXECUTE
QPFR/QPGCRTFM *PGM
*USE
*EXECUTE
QAPGPKGF *FILE
*CHANGE
*EXECUTE
QAPGGPHF *FILE
*USE
*EXECUTE
QPFR/QPGCRTPK *PGM
*USE
*EXECUTE
QAPMDMPT *FILE
*CHANGE
*EXECUTE
QPFR/QPTCHGJT *PGM
*USE
*EXECUTE
PGM Library
QPFR/QPTAGRPR *PGM
*USE
*EXECUTE
*USE
*EXECUTE
CHGPEXDFN (Q)
CPYFCNARA (Q)
QPFR/QAVCPP *PGM
CPYGPHFMT (Q)4
*EXECUTE
*EXECUTE, *ADD
*EXECUTE
QPFR/QPGCPYGP *PGM
*USE
*EXECUTE
*USE
*EXECUTE
CPYGPHPKG (Q)
*CHANGE
*EXECUTE
*EXECUTE
QPFR/QPGCPYGP *PGM
*EXECUTE
*USE
From library
*EXECUTE
To library
*EXECUTE, *ADD
Job description
406
*EXECUTE, *ADD
*USE
*EXECUTE
Performance Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CPYPFRDTA (Q)
QPFR/QITCPYCP *PGM
*USE
*EXECUTE
*USE
*EXECUTE
Model library
CRTBESTMDL (Q)
*EXECUTE, *ADD
Job description
*USE
*EXECUTE
QPFR/QCYCBMCP *PGM
*USE
*EXECUTE
QPFR/QCYCBMDL *PGM
*USE
*EXECUTE
QPFR/QCYOPDBS *PGM
*USE
*EXECUTE
QPFR/QCYCLIDS *PGM
*USE
*EXECUTE
QPFR/QCYCAPT *PGM
*USE
*EXECUTE
CRTFCNARA (Q)
*EXECUTE, *ADD
*CHANGE
*EXECUTE
QPFR/QPTAGRP *PGM
*USE
*EXECUTE
CRTGPHFMT (Q)
*EXECUTE, *ADD
*CHANGE
*EXECUTE
QPFR/QPGCRTFM *PGM
*USE
*EXECUTE
CRTGPHPKG (Q)
*EXECUTE, *ADD
QAPGGPHF *FILE
*CHANGE
*EXECUTE
*USE
*EXECUTE
QPFR/QPGCRTPK *PGM
*USE
*EXECUTE
CRTHSTDTA (Q)
*ADD, *READ
Job description
*USE
*EXECUTE
QPFR/QPGCRTHS *PGM
*USE
*EXECUTE
To Library
CRTPEXDTA (Q)
*MGTCOL Library
Data library
CRTPFRDTA (Q)
CVTPFRDTA (Q)
*EXECUTE
*READ,*ADD2
From Library
*EXECUTE
To Library
*ADD, *READ
From Library
*USE
Job description
*USE
2
CVTPFRTHD (Q)
DLTBESTMDL (Q)
*ADD, *READ
*EXECUTE
Performance data
*ADD, *READ
Model library
*EXECUTE, *ADD
QPFR/QCYDBMDL *PGM
*USE
*EXECUTE
QPFR/QCYCVTBD *CMD
*USE
*EXECUTE
QPFR/QCYCBTOD *PGM
*USE
*EXECUTE
*CHANGE
*EXECUTE
407
Performance Commands
Authority Needed
Command
DLTFCNARA (Q)
DLTGPHFMT (Q)4
DLTGPHPKG (Q)4
DLTHSTDTA (Q)4
DLTPEXDTA (Q)
Referenced Object
For Object
For Library
QPFR/QPTAGRPD *PGM
*USE
*EXECUTE
*CHANGE
*EXECUTE
QPFR/QPGDLTGP *PGM
*USE
*EXECUTE
*CHANGE
*EXECUTE
QPFR/QPGDLTGP *PGM
*USE
*EXECUTE
*CHANGE
*EXECUTE
*CHANGE
*EXECUTE
*CHANGE
*EXECUTE
QPFR/QPGDLTHS *PGM
*USE
*EXECUTE
Data Library
*EXECUTE, *DELETE
2
DLTPFRDTA (Q)4
DMPTRC (Q)
QPFR/QPTDLTCP *PGM
*USE
DSPACCGRP (Q)
DSPHSTGPH (Q)
DSPPFRDTA (Q)
*EXECUTE, *ADD
*CHANGE
*EXECUTE, *ADD
QPFR/QPTPAGD0 *PGM
*USE
*EXECUTE
*EXECUTE
*EXECUTE
*EXECUTE, *ADD
Output queue
*USE
*EXECUTE
Job description
*USE
*EXECUTE
QPFR/QPGCTRL *PGM
*USE
*EXECUTE
*EXECUTE
*USE
DSPPFRGPH (Q)
Performance data
*EXECUTE
*EXECUTE, *ADD
Output queue
*USE
*EXECUTE
Job description
*USE
*EXECUTE
QPFR/QPGCTRL *PGM
*USE
*EXECUTE
ENDJOBTRC (Q)
ENDPEX (Q)
PRTACTRPT (Q)4
408
*EXECUTE
*EXECUTE
*EXECUTE
*EXECUTE
Job description
*USE
*EXECUTE
QPFR/QPTTRCJ0 *PGM
*USE
*EXECUTE
Data Library
*READ, *ADD
QPFR/QITPRTAC *PGM
*USE
*EXECUTE
Performance data2
*USE
*ADD, *READ
Job description
*USE
*EXECUTE
Performance Commands
Authority Needed
Command
4
PRTCPTRPT (Q)
Referenced Object
For Object
For Library
QPFR/QPTCPTRP *PGM
*USE
*EXECUTE
*ADD, *READ
Performance data
Job description
PRTJOBRPT (Q)
QPFR/QPTITVXC *PGM
*USE
*EXECUTE
*USE
*EXECUTE
*ADD, *READ
Performance data
PRTJOBTRC (Q)
Job description
*USE
*EXECUTE
QPFR/QPTTRCRP *PGM
*USE
*EXECUTE
PRTLCKRPT (Q)
PRTPEXRPT
Job description
*USE
*EXECUTE
QPFR/QPTLCKQ *PGM
*USE
*EXECUTE
Data Library
PRTPOLRPT (Q)
*EXECUTE
*EXECUTE2
Outfile
*USE
*EXECUTE,*ADD
QPFR/QVPEPRTC *PGM
*USE
*EXECUTE
QPFR/QVPESVGN *SRVPGM
*USE
*EXECUTE
QPFR/QYPESVGN *SRVPGM
*USE
*EXECUTE
QPFR/QPTITVXC *PGM
*USE
*EXECUTE
*ADD, *READ
Performance data
Job description
PRTRSCRPT (Q)
QPFR/QPTITVXC *PGM
*USE
*EXECUTE
*USE
*EXECUTE
*ADD, *READ
Performance data
PRTSYSRPT (Q)
Job description
*USE
*EXECUTE
QPFR/QPTTNSRP *PGM
*USE
*EXECUTE
QAPMDMPT *FILE
PRTTNSRPT (Q)
*EXECUTE
Job description
*USE
*EXECUTE
QPFR/QPTTNSRP *PGM
*USE
*EXECUTE
PRTTRCRPT (Q)
RMVPEXDFN (Q)
*EXECUTE
Job description
*USE
*EXECUTE
QPFR/QPTTRCCP *PGM
*USE
*EXECUTE
QPFR/QCYBMAIN *PGM
*USE
*EXECUTE
Output file
*OBJOPR, *ADD
*EXECUTE
QPFR/QPTTRCJ1 *PGM
*USE
*EXECUTE
QPFR/QPGSTART *PGM
*USE
*EXECUTE
RMVPEXFTR (Q)5
STRBEST (Q)4
STRDBMON
3, 4
STRJOBTRC (Q)
STRPEX (Q)
STRPFRG (Q)4
409
Performance Commands
Authority Needed
Command
STRPFRT (Q)
WRKFCNARA (Q)
WRKPEXDFN (Q)
Referenced Object
For Object
For Library
QPFR/QMNMAIN0 *PGM
*USE
*EXECUTE
*CHANGE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
QPFR/QPTAGRP *PGM
*USE
*EXECUTE
QPFR/QPTAGRPD *PGM
*USE
*EXECUTE
QPFR/QPTAGRPR *PGM
*USE
*EXECUTE
QPFR/QPTAGRPC *PGM
*USE
*EXECUTE
*CHANGE, *ALTER
*EXECUTE, *ADD
QPFR/QITMONCP *PGM
*USE
*EXECUTE
WRKPEXFTR (Q)5
WRKSYSACT (Q)3, 4
If the default library (QPEXDATA) is specified, authority to that library is not checked.
Authority is needed to the library that contains the set of database files. Authority to the individual set of
database files is not checked.
To use this command, you must have *SERVICE special authority or you must be authorized to the Service
Trace function of Operating System/400 through iSeries Navigators Application Administration support.
The Change Function Usage Information (QSYCHFUI) API, with a function ID of QIBM_SERVICE_TRACE,
can also be used to change the list of users that are allowed to perform trace operations..
Referenced Object
For Object
CHGPDGPRF
User profile
*OBJMGT
CRTPDG
DLTPDG
*OBJEXIST
DSPPDGPRF
User profile
*OBJMGT
RTVPDGPRF
User profile
*READ
410
For Library
*READ, *ADD
*EXECUTE
Referenced Object
For Object
For Library
1, 2
CHGPSFCFG
CRTGPSFCFG 1, 2
*READ, *ADD
DLTPSFCFG
1, 2
PSF Configuration
*OBJEXIST
*EXECUTE
DSPPSFCFG
PSF Configuration
*USE
*EXECUTE
PSF Configuration
*READ
*EXECUTE
WRKPSFCFG
Problem Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
Authority Needed
Command
Referenced Object
For Object
For Library
ADDPRBACNE (Q)
Filter
*USE, *ADD
*EXECUTE
ADDPRBSLTE (Q)
Filter
*USE, *ADD
*EXECUTE
ANZPRB (Q)
SNDSRVRQS command
*USE
*EXECUTE
CHGPRB (Q)
*EXECUTE
CHGPRBACNE (Q)
Filter
*USE, *UPD
*EXECUTE
CHGPRBSLTE (Q)
Filter
*USE, *UPD
*EXECUTE
Command: DLTAPARDTA
*USE
*EXECUTE
Output file
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
DLTPRB (Q)
DSPPRB
PTRINTDTA (Q)
QRYPRBSTS (Q)
VFYCMN (Q)
Line description
Controller description
Network ID
VFYOPT (Q)
Device description
*USE
*EXECUTE
VFYTAP (Q)
Device description
*USE
*EXECUTE
Device description
*USE
*EXECUTE
*USE
*EXECUTE
VFYPRT (Q)
WRKPRB (Q)
You need *USE authority to the communications object you are verifying.
You must have *USE authority to the SNDSRVRQS command to be able to report a problem.
You must have authority to DLTAPARDTA if you want the APAR data associated with the problem to be
deleted also. See DLTAPARDTA in the Service Commands-Authorities Needed table to determine
additional authorities that are needed.
411
Program Commands
Program Commands
Authority Needed
Command
Referenced Object
For Object
For Library
The object authorities required for the CRTxxxPGM commands are listed in the Languages table in Language
Commands on page 376
ADDBKP
1
1,2
ADDPGM
ADDTRC
CALL
*USE
*EXECUTE
Program
*CHANGE
*EXECUTE
*USE
*EXECUTE
Program
*OBJOPR, *EXECUTE
*EXECUTE
*EXECUTE
*EXECUTE
Debug operation
*EXECUTE
Program
*OBJMGT, *USE
*USE
*OBJMGT, *USE
Owner
Service program
*OBJMGT, *USE
Service program
CHGDBG
CHGHLLPTR
CHGPGM
CHGPGMVAR
CHGPTR
CHGSRVPGM
*USE
*USE, *ADD, *DLT
Owner 7, *USE,
*OBJMGT
Program, Replace(*NO)
*READ, *ADD
Program, Replace(*YES)
*READ, *ADD
*USE
*EXECUTE
Module
*USE
*EXECUTE
Binding directory
*USE
*EXECUTE
*READ, *ADD
*READ, *ADD
Module
*USE
*EXECUTE
*USE
*EXECUTE
*OBJOPR *READ
*EXECUTE
Binding directory
*USE
*EXECUTE
CLRTRCDTA 1
CRTPGM
CRTSRVPGM
412
Program Commands
Authority Needed
Command
Referenced Object
For Object
For Library
CVTCLSRC
From-file
*USE
*EXECUTE
To-file
*OBJOPR, *OBJMGT,
*USE, *ADD, *DLT
*READ, *ADD
Program
*OBJEXIST
*EXECUTE
Display file
*OBJEXIST
*EXECUTE
DLTPGM
Program
*OBJEXIST
*EXECUTE
DLTSRVPGM
Service program
*OBJEXIST
*EXECUTE
DMPCLPGM
CL Program
*USE
None
Source file
*USE
*USE
*USE
*USE
Program
*CHANGE
*EXECUTE
Program
*READ
*EXECUTE
*USE
*EXECUTE
Program
*OBJOPR
*EXECUTE
Output file
Service program
*READ
*EXECUTE
*USE
*EXECUTE
*CHANGE
*EXECUTE
*USE
*USE
DLTDFUPGM
DSPBKP
1
1
DSPDBG
DSPDBGWCH
DSPMODSRC2, 4
DSPPGM
DSPPGMREF
DSPPGMVAR
DSPSRVPGM
DSPTRC
DSPTRCDTA 1
ENDCBLDBG
Program
(COBOL/400 licensed
program or S/38
environment)
ENDDBG
ENDRQS
*EXECUTE
ENTCBLDBG (S/38
environment)
Program
*CHANGE
*EXECUTE
EXTPGMINF
*OBJOPR
*EXECUTE
Program information
PRTCMDUSG
RMVBKP
RSMBKP
*USE
*EXECUTE
1
1
RMVPGM
RMVTRC
Program
*READ, *ADD
1
1
413
Program Commands
Authority Needed
Command
Referenced Object
For Object
For Library
RTVCLSRC
Program
*OBJMGT, *USE
*EXECUTE
*OBJOPR, *OBJMGT,
*ADD, *DLT
*EXECUTE
SETATNPGM
Attention-key-handling program
*OBJOPR or one or
more data authorities
*EXECUTE
SETPGMINF
Database files
*OBJOPR
*EXECUTE
Source file
*USE
*EXECUTE
Root program
*CHANGE
*READ, *ADD
Sub-program
*USE
*EXECUTE
Program
*CHANGE
*EXECUTE
*CHANGE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Program
*USE or a data
authority other than
*EXECUTE
*EXECUTE
*READ
*EXECUTE
Program
*USE
*EXECUTE
Module
*USE
*EXECUTE
Binding directory
*USE
*EXECUTE
Service Program
*USE
*EXECUTE
Module
*USE
*EXECUTE
Binding directory
*USE
*EXECUTE
*OBJOPR *READ
*EXECUTE
Program
Any authority
*USE
Service program
Any authority
*USE
STRCBLDBG
STRDBG
Program
Source file
TFRCTL
UPDPGM
UPDSRVPGM
WRKPGM
WRKSRVPGM
414
Program Commands
Authority Needed
Command
Referenced Object
For Object
For Library
When a program is in a debug operation, no further authority is needed for debug commands.
If you have *SERVICE special authority, you need only *USE authority to the program.
The DMPCLPGM command is requested from within a CL program that is already running. Because
authority to the library containing the program is checked at the time the program is called, authority to
the library is not checked again when the DMPCLPGM command is run.
The DB2 Universal Database for iSeries topic in the Information Center contains more information about
security requirements for SQL statements. See Prerequisite and related information on page xvi for
details.
To use individual operations, you need the authority required by the individual operation.
You must own the program or have *ALLOBJ and *SECADM special authorities.
Query Commands
Authority Needed
Command
ANZQRY
CHGQRYA
Referenced Object
For Object
For Library
Query definition
*USE
*EXECUTE
CRTQMFORM
CRTQMQRY
*READ, *ADD,
*EXECUTE
*ALL
*READ, *ADD,
*EXECUTE
Source file
*USE
*EXECUTE
*READ, *ADD,
*EXECUTE
*ALL
*READ, *ADD,
*EXECUTE
Source file
*USE
*EXECUTE
OVRDBF command
*USE
*EXECUTE
DLTQMFORM
OBJEXIST
*EXECUTE
DLTQMQRY
*OBJEXIST
*EXECUTE
DLTQRY
Query definition
*OBJEXIST
*EXECUTE
RTVQMFORM
*OBJEXIST
*EXECUTE
*ALL
*READ, *ADD,
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*ALL
*READ, *ADD
*USE
*EXECUTE
RTVQMQRY
415
Query Commands
Authority Needed
Command
Referenced Object
For Object
For Library
RUNQRY
Query definition
*USE
*USE
Input files
*USE
*EXECUTE
Output files
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Output file
STRQMQRY
STRQMPRC
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
STRQRY
*EXECUTE
WRKQMFORM
WRKQMQRY
WRKQRY
Any authority
*USE
Any authority
*USE
To run STRQM, you must have the authority required by the statements in the query. For example, to
insert a row in a table requires *OBJOPR, *ADD, and *EXECUTE authority to the table.
To use individual operations, you must have the authority required by the individual operation.
416
Referenced Object
Database file QAQAxxBQPY
ASKQST
CHGQSTDB (Q)
ANSQST (Q)
CRTQSTDB
(Q)
or
For Object
For Library
*READ
*READ
*READ
*READ
*READ
*READ
Database files
*READ, *ADD,
*EXECUTE
*READ
*READ
*READ
*READ
*READ
*READ
*READ
*READ
1,3
*READ
*READ, *ADD,
*EXECUTE
*READ
*READ
WRKQST
*READ
*USE
CRTQSTLOD (Q)
DLTQST (Q)
DLTQSTDB (Q)
EDTQST (Q)
LODQSTDB
STRQST
(Q)
or
WRKCNTINF
*EXECUTE
The xx portion of the file name is the index of the Question and Answer database being operated on by
the command. The index is a two-digit number in the range 00 to 99. To obtain the index for a particular
Question and Answer database, use the WRKCNTINF command.
The user profile running the command becomes the owner of newly created files, unless the OWNER
parameter of the users profile is *GRPPRF. Public authority for new files, except QAQAxxBBPY, is set to
*EXCLUDE. Public authority for QAQAxxBBPY is set to *READ.
Authority to the file is required only if loading a previously existing Question and Answer database.
The command displays the Question and Answer menu. To use individual options, you must have the
authority required by those options.
Reader Commands
Authority Needed
Command
Referenced Object
For Object
For Library
STRDBRDR
Message queue
*OBJOPR, *ADD
*EXECUTE
Database file
*OBJOPR, *USE
*EXECUTE
Job queue
*READ
*EXECUTE
Message queue
*OBJOPR, *ADD
*EXECUTE
Job queue
*READ
*EXECUTE
Device description
*OBJOPR, *READ
*EXECUTE
STRDKTRDR
HLDRDR
RLSRDR
You must be the user who started the reader, or you must have all object (*ALLOBJ) or job control
(*JOBCTL) special authority.
417
Referenced Object
For Object
For Library
ADDEXITPGM (Q)
Exit program
*USE
*EXECUTE
RMVEXITPGM (Q)
Exit program
*USE
*EXECUTE
WRKREGINF
Exit program
*USE
*EXECUTE
Referenced Object
For Object
For Library
ADDRDBDIRE
*EXECUTE
*EXECUTE
CHGRDBDIRE
*EXECUTE
*EXECUTE
*CHANGE
See General Rules on
page 311
Resource Commands
Authority Needed
Command
Referenced Object
For Object
For Library
DSPHDWRSC
DSPSFWRSC
EDTDEVRSC
WRKHDWRSC
1
418
If you use the option to create a configuration object, you must have authority to use the appropriate CRT
command.
Referenced Object
For Object
For Library
ADDFCTE
*DELETE, *USE,
*ADD
*READ, *EXECUTE
*USE
*READ, *EXECUTE
Device file
1,2
Physical file
1,2
*OBJMGT, *USE,
*ADD
*READ, *EXECUTE,
*ADD
Physical file
1,2
(member specified)
*USE, *ADD
*READ, *EXECUTE
*USE
*READ, *EXECUTE
*USE, *ADD
*READ, *EXECUTE
*USE
*READ, *EXECUTE
Session description
*READ, *EXECUTE
*USE
*READ, *EXECUTE
*USE
*READ, *EXECUTE
*USE
*READ, *EXECUTE
Session description
*READ, *EXECUTE
*READ
*READ, *EXECUTE
*READ, *ADD
*READ, *EXECUTE
*READ, *EXECUTE
*USE
*READ, *EXECUTE
Program
1,2
Message queue
ADDRJECMNE
BSC/CMN file
1,2
1,2
Device description
ADDRJERDRE
Job queue
Message queue
ADDRJEWTRE
Session description
Device file
1,2
Physical file
1,2
*OBJMGT, *USE,
*ADD
*READ, *EXECUTE,
*ADD
Physical file
1.2
(member specified)
*OBJOPR, *ADD
*READ, *EXECUTE
*USE
*READ, *EXECUTE
*USE, *ADD
*READ, *EXECUTE
*USE
*READ, *EXECUTE
CHGFCT
*OBJOPR, *OBJMGT
*READ, *EXECUTE
CHGFCTE
*USE
*READ, *EXECUTE
*USE
*READ, *EXECUTE
Program
1,2
Message queue
Device file
1,2
Physical file
1,2
*OBJMGT, *USE,
*ADD
*READ, *EXECUTE,
*ADD
Physical file
1,2
(member specified)
*USE, *ADD
*READ, *EXECUTE
*USE
*READ, *EXECUTE
*USE, *ADD
*READ, *EXECUTE
*USE
*READ, *EXECUTE
Session description
*USE
*READ, *EXECUTE
*USE
*READ, *EXECUTE
*USE
*READ, *EXECUTE
*USE
*READ, *EXECUTE
Program
1,2
Message queue
CHGRJECMNE
1,2
BSC/CMN file
1,2
1,2
Device description
419
Referenced Object
For Object
For Library
CHGRJERDRE
Session description
*READ, *EXECUTE
*USE
*READ, *EXECUTE
*USE, *ADD
*READ, *EXECUTE
*USE
*READ, *EXECUTE
*USE
*READ, *EXECUTE
Job queue
Message queue
CHGRJEWTRE
Session description
Device File
1,2
Physical file
1,2
*OBJMGT, *USE,
*ADD
*READ, *EXECUTE,
*ADD
Physical file
1,2
(member specified)
*OBJOPR, *ADD
*READ, *EXECUTE
*USE
*READ, *EXECUTE
*USE, *ADD
*READ, *EXECUTE
*USE
*READ, *EXECUTE
Session description
*OBJMGT, *READ,
*UPD, *OBJOPR
*EXECUTE, *READ
*USE
*EXECUTE
*USE, *ADD
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Session description
*USE
*EXECUTE
Message queue
*USE, *ADD
*EXECUTE
Session description
*USE
*EXECUTE
Message queue
*USE, *ADD
*EXECUTE
Program
1,2
Message queue
CHGSSND
Job queue
1,2
1,2
Message queue
1,2
CNLRJERDR
CNLRJEWTR
1,2
CRTFCT
*READ, *ADD
CRTRJEBSCF
BSC file
*READ, *EXECUTE,
*ADD
CRTRJECFG
420
*READ
*EXECUTE
Device description
*READ
*EXECUTE
Session description
Job queue
*READ, *ADD
Job description
*READ, *OBJOPR,
*ADD
Subsystem description
*READ, *OBJOPR,
*ADD
Message queue
*READ, *ADD
CMN file
*READ, *EXECUTE,
*ADD
BSC file
*READ, *EXECUTE,
*ADD
Printer file
*USE, *ADD
Referenced Object
CRTRJECFG
(continued)
Physical file
For Object
*EXECUTE, *ADD
3
*USE
*EXECUTE
Output queue
*READ
*EXECUTE
*READ
*READ
CRTRJECMNF
CRTSSND
For Library
Device description
*EXECUTE
Controller description
*EXECUTE
Line description
*EXECUTE
Communication file
*READ, *EXECUTE,
*ADD
*READ
*EXECUTE
Device description
*READ
*EXECUTE
Session description
1,2
*USE
*EXECUTE
*USE, *ADD
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Input file
*USE, *UPD
*EXECUTE
*OBJMGT, *USE,
*ADD
*READ, *EXECUTE,
*ADD
*USE, *ADD
*EXECUTE
DLTFCT
*OBJEXIST
*EXECUTE
DLTRJECFG
Session description
*OBJEXIST
*EXECUTE
Job queue
*OBJEXIST
*EXECUTE
BSC/CMN file
*OBJEXIST, *OBJOPR
*EXECUTE
Physical file
*OBJEXIST, *OBJOPR
*EXECUTE
Printer file
*OBJEXIST, OBJOPR
*EXECUTE
Message queue
*OBJEXIST, *USE,
*DLT
*EXECUTE
Job description
*OBJEXIST
*EXECUTE
*OBJEXIST, *USE
*EXECUTE
*OBJEXIST
*EXECUTE
*OBJEXIST
*EXECUTE
*OBJEXIST
*EXECUTE
Session description
*OBJEXIST
*EXECUTE
Session description
*READ
*EXECUTE
Session description
*USE
*EXECUTE
*OBJOPR, *READ,
*ADD, *DLT
*EXECUTE
Job queue
Message queue
1,2
CVTRJEDTA
1,2
Subsystem description
Device description
Controller description
Line description
DLTSSND
DSPRJECFG
ENDRJESSN
RMVFCTE
421
Referenced Object
For Object
For Library
RMVRJECMNE
Session description
*OBJOPR, *READ,
*ADD, *DLT
*EXECUTE
RMVRJERDRE
Session description
*OBJOPR, *READ,
*ADD, *DLT
*EXECUTE
RMVRJEWTRE
Session description
*OBJOPR, *READ,
*ADD, *DLT
*EXECUTE
SNDRJECMD
Session description
*USE
*EXECUTE
SBMRJEJOB
Session description
*USE
*EXECUTE
*USE
*EXECUTE
*USE, *ADD
*EXECUTE
Input file
Message queue
Job-related objects
SNDRJECMD
Session description
*USE
*EXECUTE
STRRJECSL
Session description
*USE
*EXECUTE
Message queue
*USE
*EXECUTE
Session description
*USE
*USE
Session description
*USE
*USE, *ADD
Program
*USE
*EXECUTE
*USE
*EXECUTE
STRRJERDR
STRRJESSN
*USE
*USE
*USE
*READ, *EXECUTE
*USE, *ADD
*READ, *EXECUTE
Device file
Physical file
*OBJMGT, *USE,
*ADD
*OBJOPR, *ADD
Physical file
(member specified)
*READ, *ADD
*READ, *EXECUTE
*USE, *ADD
*READ, *EXECUTE
*USE
*READ, *EXECUTE
*USE
*EXECUTE
Session description
*USE
*EXECUTE
Session description
*CHANGE
*EXECUTE
Message queue
WRKFCT
WRKRJESSN
WRKSSND
*EXECUTE
Session description
Program
If the object is not found or the required authority is not held, an information message is sent and the
function of the command is still performed.
Input files include those imbedded using the .. READFILE control statement.
To use an individual operation, you must have the authority required by the operation.
422
Referenced Object
For Object
For Library
CHGSECAUD
CFGSYSSEC
2,3
1,2,3
DSPSECA
DSPSECAUD
2,3
PRTSYSSECA 2
1
Referenced Object
For Object
For Library
User profile
*READ
*EXECUTE
CHGSVRAUTE1
DSPSVRAUTE
RMVSVRAUTE
1
If the user profile for this operation is not *CURRENT or the current user for the job, you must have
*SECADM special authority and *OBJMGT and *USE authority to the profile.
Service Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
Authority Needed
Command
APYPTF (Q)
Referenced Object
For Object
Product library
*OBJMGT
For Library
CHGSRVA (Q)
CHKCMNTRC
(Q)
CHKPRDOPT (Q)
*EXECUTE
All objects in product option
423
Service Commands
Authority Needed
Command
2
CPYPTF (Q)
Referenced Object
For Object
For Library
From file
*USE
*EXECUTE
To-file
Device description
*USE
Licensed program
CPYPTFGRP2 (Q)
*EXECUTE
*USE
*USE
*EXECUTE
QSRV library
*USE
*EXECUTE
Device description
*USE
*EXECUTE
To-file
*Same requirements
as the SAVOBJ
command
*Same requirements
as the SAVOBJ
command
From-file
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
DLTAPARDTA (Q)
3
DLTCMNTRC
(Q)
DLTPTF (Q)
DLTTRC (Q)
*EXECUTE
*EXECUTE
RMVM command
*USE
QSYS Library
*EXECUTE
Database Files
*OBJEXIST, *OBJOPR
DMPJOB (Q)
*EXECUTE
DMPJOBINT (Q)
DSPPTF (Q)
Output file
*USE
*EXECUTE
Device description
*USE
*EXECUTE
QSYS Library
*ADD, *EXECUTE
Database files
*OBJOPR,
*OBJMGMT, *ADD,
*DLT
*USE
Device Description
*USE
*EXECUTE
RSTOBJ command
*USE
*EXECUTE
*USE
*EXECUTE
Output file
DSPSRVA (Q)
DSPSRVSTS (Q)
ENDCMNTRC
(Q)
ENDCPYSCN (Q)
ENDSRVJOB (Q)
ENDTRC (Q)
INSPTF (Q)
LODPTF (Q)
LODRUN
PRTCMNTRC
424
(Q)
Service Commands
Authority Needed
Command
Referenced Object
For Object
For Library
PRTERRLOG (Q)
Output file
QSYS Library
*EXECUTE
Database Files
*USE
DLTTRC command
*USE
Product library
*OBJMGT
Line description
*READ
*EXECUTE
*USE
*EXECUTE
*CHANGE
*EXECUTE
*USE
*EXECUTE
Job queue
*USE
*EXECUTE
Device description
*USE
*EXECUTE
*USE
*EXECUTE
PRTINTDTA (Q)
PRTTRC (Q)
RMVPTF (Q)
RUNLPDA (Q)
6
SAVAPARDTA (Q)
Existing problem
SNDPTFORD
10
(Q)
SNDSRVRQS (Q)
STRCMNTRC
(Q)
STRCPYSCN
STRSRVJOB (Q)
STRSST
(Q)
STRTRC (Q)
TRCCNN
*READ, *WRITE
11
TRCCPIC (Q)
TRCICF (Q)
TRCINT11 (Q)
TRCJOB (Q)
VFYCMN (Q)
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Line description
Controller description
Network ID
VFYLNKLPDA (Q)
Line description
*READ
*EXECUTE
VFYPRT (Q)
Device description
*USE
*EXECUTE
VFYOPT (Q)
Device description
*USE
*EXECUTE
VFYTAP (Q)
Device description
*USE
*EXECUTE
QUSRSYS/QPVINDEX *USRIDX
*CHANGE
*USE
WRKCNTINF (Q)
WRKFSTAF (Q)
425
Service Commands
Authority Needed
Command
Referenced Object
For Object
For Library
WRKFSTPCT (Q)
QUSRSYS/QPVPCTABLE *USRIDX
*CHANGE
*USE
*USE, *ADD
*EXECUTE
WRKPRB
1, 10
(Q)
WRKPTFGRP (Q)
WRKSRVPVD (Q)
1
You need authority to the PRTERRLOG command for some analysis procedures or if the error log records
are being saved.
The objects listed are used by the command, but authority to the objects is not checked. Authority to use
the command is sufficient to use the objects.
You need *USE authority to the communications object that you are verifying.
When SAVAPARDTA is run for a new problem, a unique APAR library is created for that problem. If you
run SAVAPARDTA again for the same problem to collect more information, you must have Use authority
to the APAR library for the problem.
The option to add a new member to an existing output file is not valid for this command.
This command has the same authorities and restrictions as the APYPTF command and the LODPTF
command.
10
To access options 1 and 3 on the Select Reporting Option display, you must have *USE authority to the
SNDSRVRQS command.
11
To use this command, you must have *SERVICE special authority, or be authorized to the Service Trace
function of OS/400 through Operations Navigators Application Administration support. The Change
Function Usage Information (QSYCHFUI) API, with a function ID of QIBM_SERVICE_TRACE, can also be
used to change the list of users that are allowed to perform trace operations.
11
To use this command, you must have *SERVICE special authority, or be authorized to the Service Trace
function of OS/400 through Operations Navigators Application Administration support. The Change
Function Usage Information (QSYCHFUI) API, with a function ID of QIBM_SERVICE_TRACE, can also be
used to change the list of users that are allowed to perform trace operations.
Referenced Object
For Object
For Library
CRTSPADCT
*OBJEXIST
*EXECUTE
Dictionary - REPLACE(*NO)
DLTSPADCT
WRKSPADCT
1
426
*READ, *ADD
Dictionary - REPLACE(*YES)
*READ, *ADD
*OBJEXIST
*EXECUTE
Any authority
*USE
To use an individual operation, you must have the authority required by the operation .
Referenced Object
For Object
For Library
ADDSOCE
Sphere of control
*USE, *ADD
*EXECUTE
Sphere of control
*USE, *DLT
*EXECUTE
Sphere of control
*USE
*EXECUTE
DSPSOCSTS
RMVSOCE
WRKSOC
1
Command
CHGSPLFA
1,2
Authority Needed
Referenced
Object
For Object
For Library
Output
queue 3
*READ,
*DLT, *ADD
*EXECUTE
*DTAAUT
*EXECUTE
*OWNER
Owner
1
CHGSPLFA , Original
if moving
output
queue 3
spooled file
*READ,
*ADD, *DLT
Owner
DSPDTA
AUTCHK
*EXECUTE
*DTAAUT
*EXECUTE
*OWNER
*YES or *NO
CPYSPLF
Spooled file
Owner
Target
output
queue7
*READ
Target
device
*USE
Database
file
See General
Rules on
page 311
Spooled file
Owner
Output
queue 3
*READ
*EXECUTE
*YES
*READ,
*ADD, *DLT
*EXECUTE
*NO
*DTAAUT
*EXECUTE
*NO
*OWNER
*EXECUTE
*YES or *NO
Owner
DLTSPLF
Output
queue 3
Special
Authority
*YES
*JOBCTL
*YES
*JOBCTL
*YES
*JOBCTL
*YES
*JOBCTL
*YES
*JOBCTL
*OWNER
*EXECUTE
See General
Rules on
page 311
*OWNER
*READ,
*ADD, *DLT
Owner
OPRCTL
*EXECUTE
*DTAAUT
*EXECUTE
*OWNER
427
Command
DSPSPLF
Output
queue 3
Authority Needed
For Object
For Library
DSPDTA
*READ
*EXECUTE
*YES
*READ,
*ADD, *DLT
*EXECUTE
*NO
*DTAAUT
*EXECUTE
*NO
*OWNER
Owner
AUTCHK
*YES or *NO
HLDSPLF
Spooled file
Owner
Output
queue 3
*READ,
*ADD, *DLT
Owner
OPRCTL
Special
Authority
*YES
*JOBCTL
*YES
*JOBCTL
*YES
*JOBCTL
*YES
*JOBCTL
*OWNER
*EXECUTE
*DTAAUT
*EXECUTE
*OWNER
RCLSPLSTG
(Q)
RLSSPLF 1, 8
Output
queue 3
*READ,
*ADD, *DLT
Owner
SNDNETSPLF Output
1,5
queue 3
*DTAAUT
*EXECUTE
*OWNER
*READ
*EXECUTE
*YES
*READ,
*ADD, *DLT
*EXECUTE
*NO
*DTAAUT
*EXECUTE
*NO
*OWNER
*EXECUTE
*YES or *NO
Owner
Spooled file
*EXECUTE
Owner
*OWNER
WRKSPLF
|
|
|
To move a spooled file to the front of an output queue (PRTSEQ(*NEXT)) or change its priority to a value
greater than the limit specified in your user profile, you must have one of the authorities shown for the
output queue or have *SPLCTL special authority.
If you have *SPLCTL special authority, you do not need any authority to the output queue.
You must have *USE authority to the recipients output queue and output queue library when sending a
file to a user on the same system.
If you have job control (*JOBCTL) special authority and the output queue is set to OPRCTL(*YES), you do
not need *EXECUTE authority to the library of the output queue.
If you have *SPLCTL special authority, you must have *EXECUTE authority to the target output queue
library.
When the spooled file has been held with HLDJOB SPLFILE(*YES) and the spooled file was also decoupled
from the job, the user will need to have *USE authority to the RLSJOB command and either have *JOBCTL
special authority or be the owner of the spooled file.
428
Referenced Object
For Object
For Library
ADDAJE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
Job description
*OBJOPR, *READ
*EXECUTE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
Job description
*OBJOPR, *READ
*EXECUTE
User profile
*OBJOPR, *READ
ADDJOBQE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
ADDPJE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
*OBJOPR, *READ
*EXECUTE
User profile
*OBJOPR, *READ
Job description
*OBJOPR, *READ
*EXECUTE
ADDRTGE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
ADDWSE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
Job description
*OBJOPR, *READ
*EXECUTE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
Job description
*OBJOPR, *READ
*EXECUTE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
Job description
*OBJOPR, *READ
*EXECUTE
User profile
*OBJOPR, *READ
CHGJOBQE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
CHGPJE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
*OBJOPR, *READ
*EXECUTE
User profile
*OBJOPR, *READ
Job description
*OBJOPR, *READ
*EXECUTE
Subsystem description
*OJBOPR, *OBJMGT,
*READ
*EXECUTE
Subsystem description
*OJBOPR, *OBJMGT,
*READ
*EXECUTE
*YES
*EXECUTE
Subsystem description
*OJBOPR, *OBJMGT,
*READ
*EXECUTE
Job description
*OBJOPR, *READ
*EXECUTE
ADDCMNE
CHGAJE
CHGCMNE
CHGRTGE
CHGSBSD
CHGWSE
429
Referenced Object
(Q)
For Object
For Library
Subsystem description
Sign-on display file
*READ, *ADD
*USE
*EXECUTE
DLTSBSD
Subsystem description
*OBJEXIST, *USE
*EXECUTE
DSPSBSD
Subsystem description
*OBJOPR, *READ
*EXECUTE
RMVAJE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
RMVCMNE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
RMVJOBQE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
RMVPJE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
RMVRTGE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
RMVWSE
Subsystem description
*OBJOPR, *OBJMGT,
*READ
*EXECUTE
ENDSBS
PRTSBSDAUT
STRSBS
WRKSBS
Subsystem description
*USE
*READ, *EXECUTE
2, 3
Subsystem description
Any authority
*USE
Subsystem description
Any authority
*USE
WRKSBSD
1
You must have job control (*JOBCTL) special authority to use this command.
To use an individual operation, you must have the authority required by the operation.
The authority is needed to complete format checks of the display file. This helps predict that the display
will work correctly when the subsystem is started. When you are not authorized to the display file or its
library, those format checks will not be performed.
You must have *SECADMIN or *ALLBOJ special authority to specify a specific library for the subsystem
library.
System Commands
These commands do not require any object authorities:
CHGSHRPOOL
DSPSYSSTS
ENDSYS1
PWRDWNSYS1
RCLACTGRP1
1
430
RCLRSC
RETURN
RTVGRPA
SIGNOFF
WRKSHRPOOL
You must have job control (*JOBCTL) special authority to use this command.
WRKSYSSTS
CHGRPYLE (Q)
RMVRPYLE (Q)
WRKRPYLE
1,2
DSPSYSVAL
WRKSYSVAL 1,2
RTVSYSVAL
To change some system values, you must have *ALLOBJ and *SECADM special authority.
To change some system values, you must have *AUDIT special authority.
Referenced Object
For Object
For Library
CHGS36
*UPD
*EXECUTE
CHGS36A
*UPD
*EXECUTE
CHGS36PGMA
Program
*OBJMGT, *USE
*EXECUTE
CHGS36PRCA
File QS36PRC
*OBJMGT, *USE
*EXECUTE
CHGS36SRCA
Source
*OBJMGT, *USE
*EXECUTE
CRTMSGFMNU
Menu: REPLACE(*NO)
CRTS36DSPF
*READ, *ADD
Menu: REPLACE(*YES)
*READ, *ADD
*ALL
*EXECUTE
Message file
*USE
*CHANGE
*ALL
*EXECUTE
*READ, *ADD
*READ, *ADD,
*CHANGE
*ALL
*CHANGE
*USE
*EXECUTE
*OBJOPR
*EXECUTE
431
Referenced Object
CRTS36MNU
Menu: REPLACE(*NO)
For Object
*READ, *ADD,
*CHANGE
Menu: REPLACE(*YES)
*READ, *ADD,
*CHANGE
*ALL
*CHANGE
*USE
*EXECUTE
*ALL
*EXECUTE
*ALL
*EXECUTE
Display file
CRTS36MSGF
For Library
*CHANGE
CRTMSGF command
*OBJOPR, *OBJEXIST
*EXECUTE
ADDMSGD command
*OBJOPR
*EXECUTE
CRTDSPF command
*OBJOPR
*EXECUTE
*READ, *ADD,
*CHANGE
*READ, *ADD,
*CHANGE
*ALL
*CHANGE
*USE
*EXECUTE
*ALL
*EXECUTE
*ALL
*EXECUTE
*CHANGE
*EXECUTE
*ALL
*EXECUTE
CRTMSGF command
*OBJOPR, *OBJEXIST
*EXECUTE
ADDMSGD command
*OBJOPR
*EXECUTE
*OBJOPR
*EXECUTE
DSPS36
*READ
*EXECUTE
EDTS36PGMA
*OBJMGT, *USE
*EXECUTE
*USE
*EXECUTE
*OBJMGT, *USE
*EXECUTE
*USE
*EXECUTE
*OBJMGT, *USE
*EXECUTE
*USE
*EXECUTE
EDTS36PRCA
EDTS36SRCA
432
Referenced Object
For Object
For Library
RSTS36F (Q)
From-file
*USE
*EXECUTE
To-file
*ALL
*CHANGE
*EXECUTE
*USE
*EXECUTE
S/36 folder
*USE
*EXECUTE
To-folder
*CHANGE
*EXECUTE
*USE
*EXECUTE
From-file
*USE
*EXECUTE
To-file
*ALL
*USE
*EXECUTE
RTVS36A
*UPD
*EXECUTE
SAVS36F
From-file
*USE
*EXECUTE
*ALL
*USE
*EXECUTE
From-file
*USE
*EXECUTE
*ALL
*USE
*EXECUTE
WRKS36
*READ
*EXECUTE
WRKS36PGMA
*OBJMGT, *USE
*EXECUTE
*USE
*EXECUTE
*OBJMGT, *USE
*EXECUTE
*USE
*EXECUTE
*OBJMGT, *USE
*EXECUTE
*USE
*EXECUTE
RSTS36FLR
1,2,3
(Q)
RSTS36LIBM (Q)
SAVS36LIBM
WRKS36PRCA
WRKS36SRCA
You need *ALL authority to the document if replacing it. You need operational and all the data authorities
to the folder if restoring new information into the folders, or you need *ALLOBJ special authority.
If used for a data dictionary, only the authority to the command is required.
You must be enrolled in the system distribution directory if the source folder is a document folder.
Table Commands
Authority Needed
Command
Referenced Object
CRTTBL
Table
DLTTBL
For Object
For Library
*READ, *ADD,
*EXECUTE
Source file
*USE
*EXECUTE
Table
*OBJEXIST
*EXECUTE
433
Table Commands
Authority Needed
Command
WRKTBL
1
Referenced Object
For Object
For Library
Table
Any authority
*USE
To use an individual operation, you must have the authority required by the operation .
TCP/IP Commands
Commands identified by (Q) are shipped with public authority *EXCLUDE.
Appendix C shows which IBM-supplied user profiles are authorized to the
command. The security officer can grant *USE authority to others.
Authority Needed
Command
Referenced Object
For Object
For Library
CVTTCPCL (Q)
File objects
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
File Objects
*USE
*EXECUTE
ENDTCPSRV (Q)
File objects
*USE
*EXECUTE
FTP
File objects
*USE
*EXECUTE
Table objects
*USE
*EXECUTE
*USE
*EXECUTE
Table objects
*USE
*EXECUTE
*USE
*EXECUTE
File objects
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Table objects
*USE
*EXECUTE
File objects
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
ENDTCP (Q)
Line description
Controller description
Device description
File Objects
ENDTCPIFC (Q)
File objects
Line description
Controller description
Device description
ENDTCPPTP
Line description
Controller description
Device description
LPR
SETVTTBL
SNDTCPSPLF
STRTCP (Q)
Line description
Device description
STRTCPFTP
STRTCPIFC (Q)
Controller description
File objects
Line description
Controller description
Device description
434
Referenced Object
For Object
For Library
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
File Objects
*USE
*EXECUTE
Table objects
*USE
*EXECUTE
File objects
*USE
*EXECUTE
Table objects
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
CHGVTMAP
DSPVTMAP
ENDTCPCNN
MGRTCPHT 1
NETSTAT
PING
RMVCOMSNMP
RMVNETTBLE 1
RMVPCLTBLE 1
RMVSRVTBLE 1
RMVTCPHTE1
RMVTCPIFC1
RMVTCPPORT 1
RMVTCPRSI 1
RMVTCPRTE 1
RNMTCPHTE 1
SETVTMAP
VFYTCPCNN
WRKNAMSMTP
WRKNETTBLE1
WRKPCLTBLE1
WRKSRVTBLE1
WRKTCPSTS
STRTCPPTP
Line description
Controller description
Device description
STRTCPSVR (Q)
STRTCPTELN
File objects
Virtual workstation device
TELNET
Table objects
File objects
Virtual workstation device
CFGTCPSMTP
CFGTCPSNMP
CFGTCPTELN
CHGCOMSNMP
CHGFTPA 1
CHGLPDA 1
CHGSMTPA 1
CHGSNMPA 1
CHGTCPA 1
CHGTCPHTE1
CHGTCPIFC1
CHGTCPRTE 1
CHGTELNA 1
The SNDTCPSPLF command and the LPR command use the same combinations of referenced object
authorities as the SNDNETSPLF command. See page 428.
You must have *SECADM special authority to change the system alias table or another user profiles alias
table.
If you have *JOBCTL special authority, you do not need the specified authority to the object.
If you have *JOBCTL special authority, you do not need the specified authority to the object on the remote
system.
Referenced Object
For Object
For Library
WRKORDINF
QGPL/QMAHFILE file
*CHANGE,
*OBJALTER
*EXECUTE
435
Referenced Object
Authority Needed
For Object
For Library
DLTUSRIDX
User index
*OBJEXIST
*EXECUTE
DLTUSRQ
User queue
*OBJEXIST
*EXECUTE
DLTUSRSPC
User space
*OBJEXIST
*EXECUTE
Referenced Object
For Object
User profile
*OBJMGT, *USE
For Library
3, 14,
15
ANZPRFACT 3, 14,
15(Q)
CHGACTPRFL 14(Q)
CHGACTSCDE 3, 14,
15(Q)
CHGDSTPWD
CHGEXPSCDE 3, 14,
15(Q)
CHGPRF
Initial program
*USE
*EXECUTE
Job description
*USE
*EXECUTE
Message queue
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Output queue
436
11
*EXECUTE
Initial menu
CHGUSRAUD
*USE
(Q)
CHGUSRPRF
Referenced Object
For Object
For Library
User profile
*OBJMGT, *USE
*EXECUTE
*USE
*EXECUTE
Initial program
*USE
*EXECUTE
Job description
*USE
*EXECUTE
Message queue
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
Initial menu
Output queue
Attention-key-handling program
Current library
2
2,4
CHGUSRPRTI
User profile
*CHANGE
Initial program
*USE
*EXECUTE
Initial menu
*USE
*EXECUTE
Job description
*USE
*EXECUTE
Message queue
*USE
*EXECUTE
Output queue
*USE
*EXECUTE
*USE
*EXECUTE
*USE
*EXECUTE
CHKPWD
CRTUSRPRF 3, 12, 17
Current library
4
3,9
DLTUSRPRF
User profile
*OBJEXIST, *USE
*EXECUTE
*OBJEXIST, *USE,
*DLT
*EXECUTE
Message queue
DSPACTPRFL 14(Q)
DSPACTSCD
14
DSPAUTUSR
DSPEXPSCD
14
(Q)
DSPUSRPRF
DSPUSRPRTI
PRTPRFINT
14
*READ
User profile
*OBJMGT
Output file
User profile
*READ
*EXECUTE
Output file
User profile
*USE
*READ
*OBJMGT
(Q)
DSPPGMADP
GRTUSRAUT
User profile
*EXECUTE
(Q)
PRTUSRPRF
14
RSTAUT (Q)
(Q)
437
Referenced Object
For Object
For Library
User profile
*READ
User profile
*USE
*USE, *ADD
*EXECUTE
*OBJMGT, *USE,
*ADD
*EXECUTE
User profile
Any authority
8,10,
16
RTVUSRPRF
RTVUSRPRTI
SAVSECDTA
WRKUSRPRF
|
|
|
|
|
|
|
|
13
You need authority only to the objects for fields you are changing in the user profile.
*OBJMGT authority to the group profile cannot come from adopted authority.
The message queue associated with the user profile is deleted if it is owned by that user profile. To delete
the message queue, the user running the DLTUSRPRF command must have the authorities specified.
The display includes only user profiles to which the user running the command has the specified authority.
See the authorities required for the GRTOBJAUT command on page Commands Common for Most
Objects on page 313.
If you select the option to delete objects owned by the user profile, you must have the necessary authority
for the delete operations. If you select the option to transfer ownership to another user profile, you must
have the necessary authority to the objects and to the target user profile. See information for the
CHGOBJOWN command on page Commands Common for Most Objects on page 313.
10
11
12
The user whose profile is created is given these authorities to it: *OBJMGT, *OBJOPR, *READ, *ADD, *DLT,
*UPD, *EXECUTE.
13
To use an individual operation, you must have the authority required by the operation.
14
15
16
You must have *ALLOBJ and *SECADM special authorities to specify SECDTA(*PWDGRP), USRPRF(*ALL)
or OMITUSRPRF.
17
When you perform a CRTUSRPRF, you can not create a user profile (*USRPRF) into an independent disk
pool. However, when a user is privately authorized to an object in the independent disk pool, is the owner
of an object on an independent disk pool, or is the primary primary group of an object on an independent
disk pool, the name of the profile is stored on the independent disk pool. If the independent disk pool is
moved to another system, the private authority, object ownership, and primary group entries will be
attached to the profile with the same name on the target system. If a profile does not exist on the target
system, a profile will be created. The user will not have any special authorities and the password will be
set to *NONE.
438
1,2,3,4
CRTUDFS
1,2
DLTUDFS
1,2,6,7
(Q)
(Q)
Referenced Object
Object Type
File System
Authority
Needed for
Object
/dev/QASPxx
*DIR
"root"
*W, *RX
/dev/QASPxx/yyy
*BLKSF
"root"
*R
dir_to_be_ mounted_over
*DIR
"root"
*W
/dev/QASPxx
*DIR
"root"
*RWX
/dev/QASPxx
*DIR
"root"
*RWX
"root"
*RWX,
*OBJEXIST
any_epfs_object
DSPUDFS
MOUNT
1,2,3,4
RMVMFS
1,4
UNMOUNT
1,4
some_dirsxx
*DIR
"root"
*RX
/dev/QASPxx
*DIR
"root"
*RWX
/dev/QASPxx/yyy
*BLKSF
"root"
*R
dir_to_be_ mounted_over
*DIR
"root"
*W
some_dirs
*DIR
"root"
n/a
some_dirs
*DIR
"root"
n/a
QASPxx is either 01 (system asp) or 02-16 based on which user asp is needed. This is the directory that
contains the *BLKSF that is being mounted.
The directory that is mounted over (dir_to_be_mounted_over) is any IFS directory that can be mounted
over.
You must provide a path to some object. You must have *X authority for all directories in that path.
You must have *RX authority to the /etc/exports stream file and the directories in the /etc/exports path.
A UDFS can contain an entire subtree of EPFS objects, so when you delete a UDFS, you delete objects of all
types that can be stored in an EPFS file system.
When using the DLTUDFS commands, you must have *OBJEXIST authority on every object in the UDFS or
no objects are deleted.
Referenced Object
CRTVLDL
Validation list
DLTVLDL
Validation list
For Object
For Library
*ADD, *READ
*OBJEXIST
*EXECUTE
439
Referenced Object
For Object
For Library
CRTWSCST
Source file
*USE
*EXECUTE
*READ, *ADD
DLTWSCST
*OBJEXIST
*EXECUTE
RTVWSCST
*OBJOPR, *OBJMGT,
*ADD
*EXECUTE
*OBJOPR, *ADD,
*DLT
*EXECUTE
*READ, *ADD
Writer Commands
Authority Needed
Referenced
Object
Command
CHGWTR 2, 4
For Object
For Library
AUTCHK
*DTAAUT
Owner
ENDWTR
Output queue
HLDWTR
Output queue
RLSWTR
Output queue
STRDKTWTR
Output queue
*EXECUTE
*EXECUTE
*EXECUTE
*EXECUTE
*EXECUTE
*EXECUTE
440
*OBJOPR,
*READ
*EXECUTE
OPRCTL
Special
Authority
*YES
*JOBCTL
*YES
*JOBCTL
*YES
*JOBCTL
*YES
*JOBCTL
*YES
*JOBCTL
*OWNER
*DTAAUT
*OWNER
*DTAAUT
*OWNER
*DTAAUT
*OWNER
*DTAAUT
*OWNER
Writer Commands
Referenced
Object
Command
STRPRTWTR
Output queue
Authority Needed
For Object
For Library
AUTCHK
*DTAAUT
Owner
*EXECUTE
STRRMTWTR
*EXECUTE
User-defined
*READ
driver program
*EXECUTE
*EXECUTE
Separator
program
*READ
*EXECUTE
Device
description
*OBJOPR,
*READ
Output queue
Owner
*EXECUTE
*YES
*JOBCTL
*YES
*JOBCTL
*DTAAUT
*OWNER
*EXECUTE
User data
transform
Special
Authority
*OWNER
*EXECUTE
Message queue *OBJOPR,
*ADD
OPRCTL
*EXECUTE
User driver
program
*READ
*EXECUTE
*READ
*EXECUTE
WRKWTR
1
If you have *SPLCTL special authority, you do not need any authority to the output queue.
To change the output queue for the writer, you need one of the specified authorities for the new output
queue.
You must have *EXECUTE authority to the new output queues library even if the user has *SPLCTL
special authority.
441
Writer Commands
442
SAVCHGOBJ
Save Changed Object
SAVLIB
Save Library
SAVOBJ
Save Object
SAVSAVFDTA
Save Save File Data
SAVDLO
Save DLO Object
SAVLICPGM
Save Licensed Program
SAVSHF
Save Bookshelf
Note: The audit record for the save operation will identify if the save
was done with the STG(*FREE).
v Change operation
APYJRNCHG
Apply Journaled Changes
443
Object Auditing
CHGOBJD
Change Object Description
CHGOBJOWN
Change Object Owner
CRTxxxxxx
Create object
Notes:
1. If *ALL or *CHANGE is specified for the target library, a ZC entry is
written when an object is created.
2. If *CREATE is active for action auditing, a CO entry is written when
an object is created.
DLTxxxxxx
Delete object
Notes:
1. If *ALL or *CHANGE is specified for the library containing the
object, a ZC entry is written when an object is deleted.
2. If *ALL or *CHANGE is specified for the object, a ZC entry is written
when it is deleted.
3. If *DELETE is active for action auditing, a DO entry is written when
an object is deleted.
ENDJRNxxx
End Journaling
GRTOBJAUT
Grant Object Authority
Note: If authority is granted based on a referenced object, an audit
record is not written for the referenced object.
MOVOBJ
Move Object
QjoEndJournal
End Journaling
QjoStartJournal
Start Journaling
RCLSTG
Reclaim Storage:
If an object is secured by a damaged *AUTL, an audit record is
written when the object is secured by the QRCLAUTL authorization
list.
An audit record is written if an object is moved into the QRCL
library.
RMVJRNCHG
Remove Journaled Changes
RNMOBJ
Rename Object
RST
RSTCFG
Restore Configuration Objects
444
Object Auditing
RSTLIB
Restore Library
RSTLICPGM
Restore Licensed Program
RSTOBJ
Restore Object
RVKOBJAUT
Revoke Object Authority
STRJRNxxx
Start Journaling
v Operations that are not audited
Prompt
3. A prompt override program displays the current values when prompting is requested for a command. For example, if you type
CHGURSPRF USERA and press F4 (prompt), the Change User Profile display shows the current values for the USERA user
profile.
Appendix E. Object Operations and Auditing
445
Object Auditing
RTVOBJD
Retrieve Object Description
SAVSTG
Save Storage (audit of SAVSTG command only)
WRKOBJLCK
Work with Object Lock
WRKOBJOWN
Work with Objects by Owner
WRKxxx
Work with object commands
Operations for Access Path Recovery Times:
Note: Changes to access path recovery times are audited if the action auditing
(QAUDLVL) system value or the action auditing (AUDLVL) parameter in
the user profile includes *SYSMGT.
v Operations that are audited
CHGRCYAP
Change Recovery for Access Paths
EDTRCYAP
Edit Recovery for Access Paths
v Operations that are not audited
DSPRCYAP
Display Recovery for Access Paths
Operations for Alert Table (*ALRTBL):
v Read operation
None
v Change operation
ADDALRD
Add Alert Description
CHGALRD
Change Alert Description
CHGALRTBL
Change Alert Table
RMVALRD
Remove Alert Description
v Operations that are not audited
Print
WRKALRD
Work with Alert Description
WRKALRTBL
Work with Alert Table
Operations for Authorization List (*AUTL):
v Read operation
446
Object Auditing
None
v Change operation
ADDAUTLE
Add Authorization List Entry
CHGAUTLE
Change Authorization List Entry
EDTAUTL
Edit Authorization List
RMVAUTLE
Remove Authorization List Entry
v Operations that are not audited
DSPAUTL
Display Authorization List
DSPAUTLOBJ
Display Authorization List Objects
DSPAUTLDLO
Display Authorization List DLO
RTVAUTLE
Retrieve Authorization List Entry
QSYLATLO
List Objects Secured by *AUTL API
WRKAUTL
Work with authorization list
Operations for Authority Holder (*AUTHLR):
v Read operation
None
v Change operation
Associated
When used to secure an object.
v Operations that are not audited
DSPAUTHLR
Display Authority Holder
Operations for Binding Directory (*BNDDIR):
v Read operation
CRTPGM
Create Program
CRTSRVPGM
Create Service Program
|
|
RTVBNDSRC
Retrieve Binder Source
UPDPGM
Update Program
447
Object Auditing
UPDSRVPGM
Update Service Program
v Change operation
ADDBNDDIRE
Add Binding Directory Entries
RMVBNDDIRE
Remove Binding Directory Entries
v Operations that are not audited
DSPBNDDIR
Display the contents of a binding directory
WRKBNDDIR
Work with Binding Directory
WRKBNDDIRE
Work with Binding Directory Entry
Operations for Configuration List (*CFGL):
v Read operation
CPYCFGL
Copy Configuration List. An entry is written for the from-configuration-list
v Change operation
ADDCFGLE
Add Configuration List Entries
CHGCFGL
Change Configuration List
CHGCFGLE
Change Configuration List Entry
RMVCFGLE
Remove Configuration List Entry
v Operations that are not audited
DSPCFGL
Display Configuration List
WRKCFGL
Work with Configuration List
|
448
Object Auditing
v Change operation
None
v Operations that are not audited
None
Operations for Change Request Description (*CRQD):
v Read operation
QFVLSTA
List Change Request Description Activities API
QFVRTVCD
Retrieve Change Request Description API
SBMCRQ
Submit Change Request
v Change operation
ADDCMDCRQA
Add Command Change Request Activity
ADDOBJCRQA
Add Object Change Request Activity
ADDPRDCRQA
Add Product Change Request Activity
ADDPTFCRQA
Add PTF Change Request Activity
ADDRSCCRQA
Add Resource Change Request Activity
CHGCMDCRQA
Change Command Change Request Activity
CHGCRQD
Change Change Request Description
CHGOBJCRQA
Change Object Change Request Activity
CHGPRDCRQA
Change Product Change Request Activity
CHGPTFCRQA
Change PTF Change Request Activity
CHGRSCCRQA
Change Resource Change Request Activity
QFVADDA
Add Change Request Description Activity API
QFVRMVA
Remove Change Request Description Activity API
RMVCRQDA
Remove Change Request Dscription Activity
v Operations that are not audited
WRKCRQD
Work with Change Request Descriptions
Appendix E. Object Operations and Auditing
449
Object Auditing
Operations for C Locale Description (*CLD):
v Read operation
RTVCLDSRC
Retrieve C Locale Source
Setlocale
Use the C locale object during C program run time using the Set locale
function.
v Change operation
None
v Operations that are not audited
None
Operations for Class (*CLS):
v Read operation
None
v Change operation
CHGCLS
Change Class
v Operations that are not audited
Job start
When used by work management to start a job
DSPCLS
Display Class
WRKCLS
Work with Class
Operations for Command (*CMD):
v Read operation
Run
When command is run
v Change operation
CHGCMD
Change Command
CHGCMDDFT
Change Command Default
v Operations that are not audited
DSPCMD
Display Command
PRTCMDUSG
Print Command Usage
QCDRCMDI
Retrieve Command Information API
WRKCMD
Work with Command
The following commands are used within CL programs to control processing
and to manipulate data within the program. Their use is not audited.
450
Object Auditing
CALL 1
CALLPRC
CHGVAR
COPYRIGHT
DCL
DCLF
DO
ELSE
ENDDO
1
ENDPGM
ENDRCV
GOTO
IF
MONMSG
PGM
RCVF
RETURN
SNDF
SNDRCVF
TFRCTL
WAIT
Option 3 of WRKCNNL
DSPCNNL
Display Connection List
RTVCFGSRC
Retrieve source of connection list
WRKCNNL
Work with Connection List
WRKCNNLE
Work with Connection List Entry
Operations for Class-of-Service Description (*COSD):
v Read operation
None
v Change operation
CHGCOSD
Change Class-of-Service Description
v Operations that are not audited
DSPCOSD
Display Class-of-Service Description
Appendix E. Object Operations and Auditing
451
Object Auditing
RTVCFGSRC
Retrieve source of class-of-service description
WRKCOSD
Copy class-of-service description
WRKCOSD
Work with Class-of-Service Description
Operations for Communications Side Information (*CSI):
v Read operation
DSPCSI
Display Communications Side Information
Initialize
Initialize conversation
v Change operation
CHGCSI
Change Communications Side Information
v Operations that are not audited
WRKCSI
Work with Communications Side Information
Operations for Cross System Product Map (*CSPMAP):
v Read operation
Reference
When referred to in a CSP application
v Change operation
None
v Operations that are not audited
DSPCSPOBJ
Display CSP Object
WRKOBJCSP
Work with Objects for CSP
Operations for Cross System Product Table (*CSPTBL):
v Read operation
Reference
When referred to in a CSP application
v Change operation
None
v Operations that are not audited
DSPCSPOBJ
Display CSP Object
WRKOBJCSP
Work with Objects for CSP
Operations for Controller Description (*CTLD):
v Read operation
452
Object Auditing
SAVCFG
Save Configuration
VFYCMN
Link test
v Change operation
CHGCTLxxx
Change controller description
VRYCFG
Vary controller description on or off
v Operations that are not audited
DSPCTLD
Display Controller Description
ENDCTLRCY
End Controller Recovery
PRTDEVADR
Print Device Address
RSMCTLRCY
Resume Controller Recovery
RTVCFGSRC
Retrieve source of controller description
RTVCFGSTS
Retrieve controller description status
WRKCTLD
Copy controller description
WRKCTLD
Work with Controller Description
Operations for Device Description (*DEVD):
v Read operation
Acquire
First acquire of the device during open operation or explicit acquire
operation
Allocate
Allocate conversation
SAVCFG
Save Configuration
STRPASTHR
Start pass-through session
Start of the second session for intermediate pass-through
VFYCMN
Link test
v Change operation
CHGDEVxxx
Change device description
453
Object Auditing
HLDDEVxxx
Hold device description
RLSDEVxxx
Release device description
QWSSETWS
Change type-ahead setting for a device
VRYCFG
Vary device description on or off
v Operations that are not audited
DSPDEVD
Display Device Description
DSPMODSTS
Display Mode Status
ENDDEVRCY
End Device Recovery
HLDCMNDEV
Hold Communications Device
RLSCMNDEV
Release Communications Device
RSMDEVRCY
Resume Device Recovery
RTVCFGSRC
Retrieve source of device description
RTVCFGSTS
Retrieve device description status
WRKCFGSTS
Work with device status
WRKDEVD
Copy device description
WRKDEVD
Work with Device Description
Operations for Directory (*DIR):
v Read/search operations
|
|
|
|
|
CHGATR
Change Attribute
CPY
|
|
DSPCURDIR
Display Current Directory
|
|
DSPLNK
Display Links
|
|
faccessx
Determine file accessibility for a class of users by descriptor
454
Copy Object
Object Auditing
|
|
getcwd, qlgGetcwd
Get Path Name of Current Directory API
|
|
givedescriptor
Give File Access API
|
|
Qp0lGetAttr, QlgGetAttr
Get attributes APIs
|
|
Qp0lGetPathFromFileID, QlgGetPathFromFileID
Get Path From File APIs
|
|
Qp0lProcessSubtree, QlgProcessSubtree
Process a Path Name APIs
|
|
|
|
Qp0lSetAttr, QlgSetAttr
Set Attributes APIs
|
|
opendir, QlgOpendir
Open Directory APIs
|
|
RTVCURDIR
Retrieve Current Directory
SAV
|
|
WRKLNK
Work with Links
Save
v Change operation
CHGATR
Change Attributes
CHGAUD
Change Auditing
CHGAUT
Change Authority
CHGOWN
Change Owner
CHGPGP
Change Primary Group
chmod, QlgChmod
Change File Authorizations API
chown, QlgChown
Change Owner and Group API
CPY
Copy
CRTDIR
Create Directory
fchmod
Change File Authorizations by Descriptor API
fchown
Change Owner and Group of File by Descriptor API
givedescriptor
Give File Access API
Appendix E. Object Operations and Auditing
455
Object Auditing
mkdir, QlgMkdir
Make Directory API
MOV Move
|
|
Qp0lRenameKeep, QlgRenameKeep
Rename File or Directory, Keep New APIs
|
|
Qp0lRenameUnlink, QlgRenameUnlink
Rename File or Directory, Unlink New APIs
|
|
Qp0lSetAttr, QlgSetAttr
Set Attribute APIs
rmdir, QlgRmdir
Remove Directory API
RMVDIR
Remove Directory
RNM
Rename
RST
Restore
utime, QlgUtime
Set File Access and Modifcation Times API
WRKAUT
Work with Authority
WRKLNK
Work with Links
v Operations that are not audited
chdir, QlgChdir
Change Directory API
CHGCURDIR
Change Current Directory
close
closedir
Close Directory API
DSPAUT
Display Authority
dup
dup2
|
|
faccessx
Determine file accessibility for a class of users by descriptor
fpathconf
Get Configurable Path Name Variables by Descriptor API
fstat, fstat64
Get File Information by Descriptor APIs
|
|
givedescriptor
Give File Access API
456
Object Auditing
ioctl
|
|
lseek, lseek64
Set File Read/Write Offset APIs
|
|
stat, QlgStat
Get File Information API
takedescriptor
Take File Access API
Operations for Directory Services:
Note: Directory services actions are audited if the action auditing (QAUDLVL)
system value or the action auditing (AUDLVL) parameter in the user profile
includes *OFCSRV.
v Operations that are audited
Add
Change
Changing directory entry details
Delete Deleting directory entries
Rename
Renaming directory entries
Print
RTVDIRE
Retrieve Directory Entry
Collect
Collecting directory entry data using directory shadowing
Supply
Supplying directory entry data using directory shadowing
v Operations that are not audited
CL commands
CL commands that work on the directory may be audited separately
using the object auditing function.
Note: Some CL directory commands cause an audit record because they
perform a function that is audited by *OFCSRV action auditing,
such as adding a directory entry.
Appendix E. Object Operations and Auditing
457
Object Auditing
CHGSYSDIRA
Change System Directory Attributes
Departments
Adding, changing, deleting, or displaying directory department data
Descriptions
Assigning a description to a different directory entry using option 8
from the WRKDIR panel.
Adding, changing, or deleting directory entry descriptions
Distribution lists
Adding, changing, renaming, or deleting distribution lists
ENDDIRSHD
End Directory Shadowing
List
Locations
Adding, changing, deleting, or displaying directory location data
Nickname
Adding, changing, renaming or deleting nicknames
Search
Searching for directory entries
STRDIRSHD
Start Directory Shadowing
Operations for Document Library Object (*DOC or *FLR):
v Read operation
CHKDOC
Check document spelling
CPYDOC
Copy Document
DMPDLO
Dump DLO
DSPDLOAUD
Display DLO Auditing
Note: If auditing information is displayed for all documents in a folder,
and object auditing is specified for the folder, an audit record is
written. Displaying object auditing for individual documents does
not result in an audit record.
DSPDLOAUT
Display DLO Authority
DSPDOC
Display Document
DSPHLPDOC
Display Help Document
EDTDLOAUT
Edit DLO Authority
458
Object Auditing
MRGDOC
Merge Document
PRTDOC
Print Document
QHFCPYSF
Copy Stream File API
QHFGETSZ
Get Stream File Size API
QHFRDDR
Read Directory Entry API
QHFRDSF
Read Stream File API
RTVDOC
Retrieve Document
SAVDLO
Save DLO
SAVSHF
Save bookshelf
SNDDOC
Send Document
SNDDST
Send Distribution
WRKDOC
Work with Document
Note: A read entry is written for the folder containing the documents.
v Change operation
ADDDLOAUT
Add DLO Authority
ADDOFCENR
Add Office Enrollment
CHGDLOAUD
Change DLO Auditing
CHGDLOAUT
Change DLO Authority
CHGDLOOWN
Change DLO Ownership
CHGDLOPGP
Change DLO Primary Group
CHGDOCD
Change Document Description
CHGDSTD
Change Distribution Description
CPYDOC 4
Copy Document
459
Object Auditing
Note: A change entry is written if the target document already exists.
CRTFLR
Create Folder
CVTTOFLR 4
Convert to Folder
DLTDLO 4
Delete DLO
DLTSHF
Delete Bookshelf
DTLDOCL 4
Delete Document List
DLTDST 4
Delete Distribution
EDTDLOAUT
Edit DLO Authority
EDTDOC
Edit Document
FILDOC 4
File Document
GRTACCAUT
Grant Access Code Authority
GRTUSRPMN
Grant User Permission
MOVDOC 4
Move Document
MRGDOC 4
Merge Document
PAGDOC
Paginate Document
QHFCHGAT
Change Directory Entry Attributes API
QHFSETSZ
Set Stream File Size API
QHFWRTSF
Write Stream File API
QRYDOCLIB 4
Query Document Library
Note: A change entry is written if an existing document resulting from a
search is replaced.
RCVDST 4
Receive Distribution
4. A change entry is written for both the document and the folder if the target of the operation is in a folder.
460
Object Auditing
RGZDLO
Reorganize DLO
RMVACC
Remove access code, for any DLO to which the access code is attached
RMVDLOAUT
Remove DLO authority
RNMDLO 4
Rename DLO
RPLDOC
Replace Document
RSTDLO 4
Restore DLO
RSTSHF
Restore Bookshelf
RTVDOC
Retrieve Document (check out)
RVKACCAUT
Revoke Access Code Authority
RVKUSRPMN
Revoke User Permission
SAVDLO 4
Save DLO
v Operations that are not audited
ADDACC
Add Access Code
DSPACC
Display Access Code
DSPUSRPMN
Display User Permission
QHFCHGFP
Change File Pointer API
QHFCLODR
Close Directory API
QHFCLOSF
Close Stream File API
QHFFRCSF
Force Buffered Data API
QHFLULSF
Lock/Unlock Stream File Range API
QHFRTVAT
Retrieve Directory Entry Attributes API
RCLDLO
Reclaim DLO (*ALL or *INT)
WRKDOCLIB
Work with Document Library
Appendix E. Object Operations and Auditing
461
Object Auditing
WRKDOCPRTQ
Work with Document Print Queue
Operations for Data Area (*DTAARA):
v Read operation
DSPDTAARA
Display Data Area
RCVDTAARA
Receive Data Area (S/38 command)
RTVDTAARA
Retrieve Data Area
QWCRDTAA
Retrieve Data Area API
v Change operation
CHGDTAARA
Change Data Area
SNDDTAARA
Send Data Area
v Operations that are not audited
Data Areas
Local Data Area, Group Data Area, PIP (Program Initialization
Parameter) Data Area
WRKDTAARA
Work with Data Area
Operations for Interactive Data Definition Utility (*DTADCT):
v Read operation
None
v Change operation
Create Data dictionary and data definitions
Change
Data dictionary and data definitions
Copy
462
Object Auditing
QMHRDQM
Retrieve Data Queue Message API
v Change operation
QRCVDTAQ
Receive Data Queue API
QSNDDTAQ
Send Data Queue API
QCLRDTAQ
Clear Data Queue API
v Operations that are not audited
WRKDTAQ
Work with Data Queue
QMHQRDQD
Retrieve Data Queue Description API
Operations for Edit Description (*EDTD):
v Read operation
DSPEDTD
Display Edit Description
QECCVTEC
Edit code expansion API (via routine QECEDITU)
v Change operation
None
v Operations that are not audited
WRKEDTD
Work with Edit Descriptions
QECEDT
Edit API
QECCVTEW
API for translating Edit Work into Edit Mask
Operations for Exit Registration (*EXITRG):
v Read operation
QUSRTVEI
Retrieve Exit Information API
QusRetrieveExitInformation
Retrieve Exit Information API
v Change operation
ADDEXITPGM
Add Exit Program
QUSADDEP
Add Exit Program API
QusAddExitProgram
Add Exit Program API
QUSDRGPT
Deregister Exit Point API
Appendix E. Object Operations and Auditing
463
Object Auditing
QusDeregisterExitPoint
Deregister Exit Point API
QUSRGPT
Register Exit Point API
QusRegisterExitPoint
Register Exit Point API
QUSRMVEP
Remove Exit Program API
QusRemoveExitProgram
Remove Exit Program API
RMVEXITPGM
Remove Exit Program
WRKREGINF
Work with Registration Information
v Operations that are not audited
None
Operations for Forms Control Table (*FCT):
v No Read or Change operations are audited for the *FCT object type.
Operations for File (*FILE):
v Read operation
CPYF
Open
DSPPFM
Display Physical File Member (uses open operation)
Open
CRTBSCF
Create BSC File (uses open operation)
CRTCMNF
Create Communications File (uses open operation)
CRTDSPF
Create Display File (uses open operation)
CRTICFF
Create ICF File (uses open operation)
CRTMXDF
Create MXD File (uses open operation)
CRTPRTF
Create Printer File (uses open operation)
CRTPF
Create Physical File (uses open operation)
CRTLF
Create Logical File (uses open operation)
DSPMODSRC
Display Module Source (uses open operation)
464
Object Auditing
STRDBG
Start Debug (uses open operation)
QTEDBGS
Retrieve View Text API
v Change operation
Open
ADDBSCDEVE
(S/38E) Add Bisync Device Entry to a mixed device file
ADDCMNDEVE
(S/38E) Add Communications Device Entry to a mixed device file
ADDDSPDEVE
(S/38E) Add Display Device Entry to a mixed device file
ADDICFDEVE
(S/38E) Add ICF Device Entry to a mixed device file
ADDLFM
Add Logical File Member
ADDPFCST
Add Physical File Constraint
ADDPFM
Add Physical File Member
ADDPFTRG
Add Physical File Trigger
ADDPFVLM
Add Physical File Variable Length Member
CHGBSCF
Change Bisync function
CHGCMNF
(S/38E) Change Communications File
CHGDDMF
Change DDM File
CHGDKTF
Change Diskette File
CHGDSPF
Change Display File
CHGICFDEVE
Change ICF Device File Entry
CHGICFF
Change ICF File
CHGMXDF
(S/38E) Change Mixed Device File
CHGLF
Change Logical File
CHGLFM
Change Logical File Member
465
Object Auditing
CHGPF
Change Physical File
CHGPFCST
Change Physical File Constraint
CHGPFM
Change Physical File Member
CHGPRTF
Change Printer Device GQle
CHGSAVF
Change Save File
CHGS36PRCA
Change S/36 Procedure Attributes
CHGS36SRCA
Change S/36 Source Attributes
CHGTAPF
Change Tape Device File
CLRPFM
Clear Physical File Member
CPYF
Copy File (open file for modification, such as adding records, clearing a
member, or saving a member
EDTS36PRCA
Edit S/36 Procedure Attributes
EDTS36SRCA
Edit S/36 Source Attributes
INZPFM
Initialize Physical File Member
JRNAP
(S/38E) Start Journal Access Path (entry per file)
JRNPF
(S/38E) Start Journal Physical File (entry per file)
RGZPFM
Reorganize Physical File Member
RMVBSCDEVE
(S/38E) Remove BSC Device Entry from a mixed dev file
RMVCMNDEVE
(S/38E) Remove CMN Device Entry from a mixed dev file
RMVDSPDEVE
(S/38E) Remove DSP Device Entry from a mixed dev file
RMVICFDEVE
(S/38E) Remove ICF Device Entry from an ICM dev file
RMVM
Remove Member
RMVPFCST
Remove Physical File Constraint
466
Object Auditing
RMVPFTGR
Remove Physical File Trigger
RNMM
Rename Member
WRKS36PRCA
Work with S/36 Procedure Attributes
WRKS36SRCA
Work with S/36 Source Attributes
v Operations that are not audited
DSPCPCST
Display Check Pending Constraints
DSPFD
Display File Description
DSPFFD
Display File Field Description
DSPDBR
Display Database Relations
DSPPGMREF
Display Program File References
EDTCPCST
Edit Check Pending Constraints
OVRxxx
Override file
RTVMBRD
Retrieve Member Description
WRKPFCST
Work with Physical File Constraints
WRKF
Work with File
|
|
467
Object Auditing
Operations for Form Definition (*FORMDF):
v Read operation
Print Printing a spooled file that refers to the form definition
v Change operation
None
v Operations that are not audited
WRKFORMDF
Work with Form Definition
Print
468
Object Auditing
WRKFTRACNE
Work with Filter Action Entries
WRKFTRSLTE
Work with Filter Selection Entries
Operations for Graphics Symbols Set (*GSS):
v Read operation
Loaded
When it is loaded
Font
When it is used as a font in an externally described printer file
v Change operation
None.
v Operations that are not audited
WRKGSS
Work with Graphic Symbol Set
Operations for Double-Byte Character Set Dictionary (*IGCDCT):
v Read operation
DSPIGCDCT
Display IGC Dictionary
v Change operation
EDTIGCDCT
Edit IGC Dictionary
Operations for Double-Byte Character Set Sort (*IGCSRT):
v Read operation
CPYIGCSRT
Copy IGC Sort (from-*ICGSRT-object)
Conversion
Conversion to V3R1 format, if necessary
Print
v Change operation
CPYIGCSRT
Copy IGC Sort (to-*ICGSRT-object)
Conversion
Conversion to V3R1 format, if necessary
Create Create a user-defined character (option 1 from CGU menu)
Delete Delete a user-defined character (option 2 from CGU menu)
Update
Update the active sort table (option 5 from CGU menu)
v Operations that are not audited
FMTDTA
Sort records or fields in a file
Appendix E. Object Operations and Auditing
469
Object Auditing
Operations for Double-Byte Character Set Table (*IGCTBL):
v Read operation
CPYIGCTBL
Copy IGC Table
STRFMA
Start Font Management Aid
v Change operation
STRFMA
Start Font Management Aid
v Operations that are not audited
CHKIGCTBL
Check IGC Table
Operations for Job Description (*JOBD):
v Read operation
None
v Change operation
CHGJOBD
Change Job Description
v Operations that are not audited
DSPJOBD
Display Job Description
WRKJOBD
Work with Job Description
QWDRJOBD
Retrieve Job Description API
Batch job
When used to establish a job
Operations for Job Queue (*JOBQ):
v Read operation
None
v Change operation
Entry
CLRJOBQ
Clear Job Queue
HLDJOBQ
Hold Job Queue
RLSJOBQ
Release Job Queue
v Operations that are not audited
ADDJOBQE Subsystem Descriptions on page 191
Add Job Queue Entry
5. An audit record is written if object auditing is specified for the subsystem description (*SBSD).
470
Object Auditing
CHGJOB
Change Job from one JOBQ to another JOBQ
CHGJOBQE Subsystem Descriptions on page 191
Change Job Queue Entry
QSPRJOBQ
Retrieve job queue information
RMVJOBQE Subsystem Descriptions on page 191
Remove Job Queue Entry
TFRJOB
Transfer Job
TFRBCHJOB
Transfer Batch Job
WRKJOBQ
Work with Job Queue for a specific job queue
WRKJOBQ
Work with Job Queue for all job queues
Operations for Job Scheduler Object (*JOBSCD):
v Read operation
None
v Change operation
ADDJOBSCDE
Add Job Schedule Entry
CHGJOBSCDE
Change Job Schedule Entry
RMVJOBSCDE
Remove Job Schedule Entry
HLDJOBSCDE
Hold Job Schedule Entry
RLSJOBSCDE
Release Job Schedule Entry
v Operations that are not audited
Display
Display details of scheduled job entry
WRKJOBSCDE
Work with Job Schedule Entries
Work with ...
Work with previously submitted jobs from job schedule entry
QWCLSCDE
List job schedule entry API
Operations for Journal (*JRN):
v Read operation
CMPJRNIMG
Compare Journal Images
471
Object Auditing
DSPJRN
Display Journal Entry for user journals
QJORJIDI
Retrieve Journal Identifier (JID) Information
QjoRetrieveJournalEntries
Retrieve Journal Entries
RCVJRNE
Receive Journal Entry
RTVJRNE
Retrieve Journal Entry
v Change operation
ADDRMTJRN
Add Remote Journal
APYJRNCHG
Apply Journaled Changes
CHGJRN
Change Journal
CHGRMTJRN
Change Remote Journal
ENDJRNxxx
End Journaling
JRNAP
(S/38E) Start Journal Access Path
JRNPF
(S/38E) Start Journal Physical File
QjoAddRemoteJournal
Add Remote Journal API
QjoChangeJournalState
Change Journal State API
QjoEndJournal
End Journaling API
QjoRemoveRemoteJournal
Remove Remote Journal API
QJOSJRNE
Send Journal Entry API (user entries only via QJOSJRNE API)
QjoStartJournal
Start Journaling API
RMVJRNCHG
Remove Journaled Changes
RMVRMTJRN
Remove Remote Journal
SNDJRNE
Send Journal Entry (user entries only via SNDJRNE command)
STRJRNxxx
Start Journaling
472
Object Auditing
v Operations that are not audited
DSPJRN
Display Journal Entry for internal system journals, JRN(*INTSYSJRN)
DSPJRNA
(S/38E) Work with Journal Attributes
DSPJRNMNU
(S/38E) Work with Journal
QjoRetrieveJournalInformation
Retrieve Journal Information API
WRKJRN
Work with Journal (DSPJRNMNU in S/38 environment)
WRKJRNA
Work with Journal Attributes (DSPJRNA in S/38 environment)
Operations for Journal Receiver (*JRNRCV):
v Read operation
None
v Change operation
CHGJRN
Change Journal (when attaching new receivers)
v Operations that are not audited
DSPJRNRCVA
Display Journal Receiver Attributes
QjoRtvJrnReceiverInformation
Retrieve Journal Receiver Information API
WRKJRNRCV
Work with Journal Receiver
Operations for Library (*LIB):
v Read operation
DSPLIB
Display Library (when not empty. If library is empty, no audit is
performed.)
Locate When a library is accessed to find an object
Notes:
1. Several audit entries may be written for a library for a single
command. For example, when you open a file, a ZR audit journal
entry for the library is written when the system locates the file and
each member in the file.
2. No audit entry is written if the locate function is not successful. For
example, you run a command using a generic parameter, such as:
DSPOBJD OBJECT(AR*/*ALL) +
OBJTYPE(*FILE)
If a library whose name begins with AR does not have any file
names beginning with WRK, no audit record is written for that
library.
Appendix E. Object Operations and Auditing
473
Object Auditing
v Change operation
Library list
Adding library to a library list
CHGLIB
Change Library
CLRLIB
Clear Library
MOVOBJ
Move Object
RNMOBJ
Rename Object
Add
DSPLIND
Display Line Description
ENDLINRCY
End Line Recovery
RLSCMNDEV
Release Communications Device
RSMLINRCY
Resume Line Recovery
474
Object Auditing
RTVCFGSRC
Retrieve Source of line description
RTVCFGSTS
Retrieve line description status
WRKLIND
Work with Line Description
WRKCFGSTS
Work with line description status
Operations for Mail Services:
Note: Mail services actions are audited if the action auditing (QAUDLVL) system
value or the action auditing (AUDLVL) parameter in the user profile
includes *OFCSRV.
v Operations that are audited
Change
Changes to the system distribution directory
On behalf
Working on behalf of another user
Note: Working on behalf of another user is audited if the AUDLVL in
the user profile or the QAUDLVL system value includes
*SECURITY.
Open
Forward
Forward a mail item
Print
Receive
Receive a mail item
Reply Reply to a mail item
Send
View
475
Object Auditing
Display
Displaying a menu through the GO MENU command or UIM dialog
command
v Change operation
CHGMNU
Change Menu
v Operations that are not audited
Return
Returning to a menu in the menu stack that has already been displayed
DSPMNUA
Display Menu Attributes
WRKMNU
Work with Menu
Operations for Mode Description (*MODD):
v Read operation
None
v Change operation
CHGMODD
Change Mode Description
v Operations that are not audited
CHGSSNMAX
Change session maximum
DSPMODD
Display Mode Description
ENDMOD
End Mode
STRMOD
Start Mode
WRKMODD
Work with Mode Descriptions
Operations for Module Object (*MODULE):
v Read operation
CRTPGM
An audit entry for each module object used during a CRTPGM.
CRTSRVPGM
An audit entry for each module object used during a CRTSRVPGM
UPDPGM
An audit entry for each module object used during an UPDPGM
UPDSRVPGM
An audit entry for each module object used during an UPDSRVPGM
v Change operation
CHGMOD
Change Module
v Operations that are not audited
476
Object Auditing
DSPMOD
Display Module
RTVBNDSRC
Retrieve Binder Source
WRKMOD
Work with Module
Operations for Message File (*MSGF):
v Read operation
DSPMSGD
Display Message Description
MRGMSGF
Merge Message File from-file
Print
RTVMSG
Retrieve information from a message file
QMHRTVM
Retrieve Message API
WRKMSGD
Work with Message Description
v Change operation
ADDMSGD
Add Message Description
CHGMSGD
Change Message Description
CHGMSGF
Change Message File
MRGMSGF
Merge Message File (to-file and replace MSGF)
RMVMSGD
Remove Message Description
v Operations that are not audited
OVRMSGF
Override Message File
WRKMSGF
Work with Message File
QMHRMFAT
Retrieve Message File Attributes API
Operations for Message Queue (*MSGQ):
v Read operation
QMHLSTM
List Nonprogram Messages API
QMHRMQAT
Retrieve Nonprogram Message Queue Attributes API
477
Object Auditing
DSPLOG
Display Log
DSPMSG
Display Message
Print
Print Messages
RCVMSG
Receive Message RMV(*NO)
QMHRCVM
Receive Nonprogram Messages API when message action is not
*REMOVE.
v Change operation
CHGMSGQ
Change Message Queue
CLRMSGQ
Clear Message Queue
RCVMSG
Receive Message RMV(*YES)
QMHRCVM
Receive Nonprogram Messages API when message action is *REMOVE.
RMVMSG
Remove Message
QMHRMVM
Remove Nonprogram Messages API
SNDxxxMSG
Send a Message to a message queue
QMHSNDBM
Send Break Message API
QMHSNDM
Send Nonprogram Message API
QMHSNDRM
Send Reply Message API
SNDRPY
Send Reply
WRKMSG
Work with Message
v Operations that are not audited
WRKMSGQ
Work with Message Queue
Program
Program message queue operations
Operations for Node Group (*NODGRP):
v Read operation
DSPNODGRP
Display Node Group
478
Object Auditing
v Change operation
CHGNODGRPA
Change Node Group
Operations for Node List (*NODL):
v Read operation
QFVLSTNL
List node list entries
v Change operation
ADDNODLE
Add Node List Entry
RMVNODLE
Remove Node List Entry
v Operations that are not audited
WRKNODL
Work with Node List
WRKNODLE
Work with Node List Entries
Operations for NetBIOS Description (*NTBD):
v Read operation
SAVCFG
Save Configuration
v Change operation
CHGNTBD
Change NetBIOS Description
v Operations that are not audited
Copy
Option 3 of WRKNTBD
DSPNTBD
Display NetBIOS Description
RTVCFGSRC
Retrieve Configuration Source of NetBIOS description
WRKNTBD
Work with NetBIOS Description
Operations for Network Interface (*NWID):
v Read operation
SAVCFG
Save Configuration
v Change operation
CHGNWIISDN
Change Network Interface Description
VRYCFG
Vary network interface description on or off
v Operations that are not audited
Copy
Option 3 of WRKNWID
Appendix E. Object Operations and Auditing
479
Object Auditing
DSPNWID
Display Network Interface Description
ENDNWIRCY
End Network Interface Recovery
RSMNWIRCY
Resume Network Interface Recovery
RTVCFGSRC
Retrieve Source of Network Interface Description
RTVCFGSTS
Retrieve Status of Network Interface Description
WRKNWID
Work with Network Interface Description
WRKCFGSTS
Work with network interface description status
Operations for Network Server Description (*NWSD):
v Read operation
SAVCFG
Save Configuration
v Change operation
CHGNWSD
Change Network Server Description
VRYCFG
Vary Configuration
v Operations that are not audited
Copy
Option 3 of WRKNWSD
DSPNWSD
Display Network Server Description
RTVCFGSRC
Retrieve Configuration Source for *NWSD
RTVCFGSTS
Retrieve Configuration Status for *NWSD
WRKNWSD
Work with Network Server Description
Operations for Output Queue (*OUTQ):
v Read operation
STRPRTWTR
Start a Printer Writer to an OUTQ
STRRMTWTR
Start a Remote Writer to an OUTQ
v Change operation
Placement
When an entry is placed on or removed from the queue
CHGOUTQ
Change Output Queue
480
Object Auditing
CHGSPLFA 6
Change Spooled File Attributes, if moved to a different output queue
and either output queue is audited
CLROUTQ
Clear Output Queue
DLTSPLF 6
Delete Spooled File
HLDOUTQ
Hold Output Queue
RLSOUTQ
Release Output Queue
v Operations that are not audited
CHGSPLFA 6
Change Spooled File Attributes
CPYSPLF 6
Copy Spooled File
Create
6. This is also audited if action auditing (QAUDLVL system value or AUDLVL user profile value) includes *SPLFDTA.
Appendix E. Object Operations and Auditing
481
Object Auditing
WRKOVL
Work with overlay
Print
CHGPDGPRF
Change Print Descriptor Group Profile
WRKPDG
Work with Print Descriptor Group
Operations for Program (*PGM):
v Read operation
Activation
Program activation
Call
ADDPGM
Add program to debug
482
Object Auditing
QTEDBGS
Qte Register Debug View API
QTEDBGS
Qte Retrieve Module Views API
// RUN
Run program in S/36 environment
RTVCLSRC
Retrieve CL Source
STRDBG
Start Debug
v Create operation
CRTPGM
Create Program
UPDPGM
Update Program
v Change operation
CHGCSPPGM
Change CSP/AE Program
CHGPGM
Change Program
CHGS36PGMA
Change S/36 Program Attributes
EDTS36PGMA
Edit S/36 Program Attributes
WRKS36PGMA
Work with S/36 Program Attributes
v Operations that are not audited
ANZPGM
Analyze Program
DMPCLPGM
Dump CL Program
DSPCSPOBJ
Display CSP Object
DSPPGM
Display Program
PRTCMDUSG
Print Command Usage
PRTCSPAPP
Print CSP Application
PRTSQLINF
Print SQL Information
QBNLPGMI
List ILE Program Information API
QCLRPGMI
Retrieve Program Information API
Appendix E. Object Operations and Auditing
483
Object Auditing
STRCSP
Start CSP Utilities
TRCCSP
Trace CSP Application
WRKOBJCSP
Work with Objects for CSP
WRKPGM
Work with Program
Operations for Panel Group (*PNLGRP):
v Read operation
ADDSCHIDXE
Add Search Index Entry
QUIOPNDA
Open Panel Group for Display API
QUIOPNPA
Open Panel Group for Print API
QUHDSPH
Display Help API
v Change operation
None
v Operations that are not audited
WRKPNLGRP
Work with Panel Group
Operations for Product Availability (*PRDAVL):
v Change operation
WRKSPTPRD
Work with Supported Products, when support is added or removed
v Operations that are not audited
Read
484
Object Auditing
v Operations that are not audited
Read
Run a query
CRTQMFORM
Create Query Management Form
IMPORT
Import Query Management form
Save
Copy Option 3 from the Work with Query Manager Forms function
v Operations that are not audited
Work with
When *QMFORMs are listed in a Work with display
Active Any form operation that is done against the active form.
Operations for Query Manager Query (*QMQRY):
v Read operation
RTVQMQRY
Retrieve Query Manager Query
Run
STRQMQRY
Start Query Manager Query
Export Export Query Manager query
Print
CRTQMQRY
Create Query Management Query
Convert
Option 10 (Convert to SQL) from the Work with Query Manager Queries
function
Appendix E. Object Operations and Auditing
485
Object Auditing
Copy
QRYRUN
Run Query
RTVQMFORM
Retrieve Query Management Form
RTVQMQRY
Retrieve Query Management Query
Run
RUNQRY
Run Query
STRQMQRY
Start Query Management Query
Submit
Submit a query (run request) to batch using WRKQRY prompt display
or Exit This Query prompt display
v Change operation
Change
Save a changed query using the Query/400 licensed program
v Operations that are not audited
Copy
Create Create a query using option 1 on the Work with Queries display
Delete Delete a query using option 4 on the Work with Queries display
486
Object Auditing
Run
Run a query using option 1 on the Exit this Query display when
creating or changing a query using the Query/400 licensed program;
Run a query interactively using PF5 while creating, displaying, or
changing a query using the Query/400 licensed program
DLTQRY
Delete a query
Operations for Reference Code Translate Table (*RCT):
v Read operation
None
v Change operation
None
v Operations that are not audited
None
Operations for Reply List:
Note: Reply list actions are audited if the action auditing (QAUDLVL) system
value or the action auditing (AUDLVL) parameter in the user profile
includes *SYSMGT.
v Operations that are audited
ADDRPYLE
Add Reply List Entry
CHGRPYLE
Change Reply List Entry
RMVRPYLE
Remove Reply List Entry
WRKRPYLE
Work with Reply List Entry
v Operations that are not audited
None
Operations for Subsystem Description (*SBSD):
v Read operation
ENDSBS
End Subsystem
STRSBS
Start Subsystem
v Change operation
ADDAJE
Add Autostart Job Entry
ADDCMNE
Add Communications Entry
ADDJOBQE
Add Job Queue Entry
ADDPJE
Add Prestart Job Entry
Appendix E. Object Operations and Auditing
487
Object Auditing
ADDRTGE
Add Routing Entry
ADDWSE
Add Workstation Entry
CHGAJE
Change Autostart Job Entry
CHGCMNE
Change Communications Entry
CHGJOBQE
Change Job Queue Entry
CHGPJE
Change Prestart Job Entry
CHGRTGE
Change Routing Entry
CHGSBSD
Change Subsystem Description
CHGWSE
Change Workstation Entry
RMVAJE
Remove Autostart Job Entry
RMVCMNE
Remove Communications Entry
RMVJOBQE
Remove Job Queue Entry
RMVPJE
Remove Prestart Job Entry
RMVRTGE
Remove Routing Entry
RMVWSE
Remove Workstation Entry
v Operations that are not audited
DSPSBSD
Display Subsystem Description
QWCLASBS
List Active Subsystem API
QWDLSJBQ
List Subsystem Job Queue API
QWDRSBSD
Retrieve Subsystem Description API
WRKSBSD
Work with Subsystem Description
WRKSBS
Work with Subsystem
WRKSBSJOB
Work with Subsystem Job
488
Object Auditing
Operations for Information Search Index (*SCHIDX):
v Read operation
STRSCHIDX
Start Index Search
WRKSCHIDXE
Work with Search Index Entry
v Change operation (audited if OBJAUD is *CHANGE or *ALL)
ADDSCHIDXE
Add Search Index Entry
CHGSCHIDX
Change Search Index
RMVSCHIDXE
Remove Search Index Entry
v Operations that are not audited
WRKSCHIDX
Work with Search Index
Operations for Local Socket (*SOCKET):
v Read operation
connect
Bind a permanent destination to a socket and establish a connection.
DSPLNK
Display Links
givedescriptor
Give File Access API
Qp0lGetPathFromFileID
Get Path Name of Object from File ID API
Qp0lRenameKeep
Rename File or Directory, Keep New API
Qp0lRenameUnlink
Rename File or Directory, Unlink New API
sendmsg
Send a datagram in connectionless mode. Can use multiple buffers.
sendto
Send a datagram in connectionless mode.
WRKLNK
Work with Links
v Change operation
ADDLNK
Add Link
bind
CHGAUD
Change Auditing
CHGAUT
Change Authority
Appendix E. Object Operations and Auditing
489
Object Auditing
CHGOWN
Change Owner
CHGPGP
Change Primary Group
CHKIN
Check In
CHKOUT
Check Out
chmod
Change File Authorizations API
chown
Change Owner and Group API
givedescriptor
Give File Access API
link
Qp0lRenameKeep
Rename File or Directory, Keep New API
Qp0lRenameUnlink
Rename File or Directory, Unlink New API
RMVLNK
Remove Link
RNM
Rename
RST
Restore
unlink
Remove Link to File API
utime Set File Access and Modifcation Times API
WRKAUT
Work with Authority
WRKLNK
Work with Links
v Operations that are not audited:
close
DSPAUT
Display Authority
dup
dup2
fcntl
fstat
fsync
ioctl
lstat
pathconf
Get Configurable Path Name Variables API
490
Object Auditing
read
readv
select
stat
takedescriptor
Take File Access API
write
Hyphenation
Hyphenation function
Dehyphenation
Dehyphenation function
Synonyms
Synonym function
Base
491
Object Auditing
QSPOPNSP API
Change
Changing any of the following spooled file attributes:
COPIES
DEV
FORMTYPE
RESTART
PAGERANGE
Create Creating a spooled file using print operations
Creating a spooled file using the QSPCRTSP API
Delete Deleting a spooled file using any of the following:
Printing a spooled file by a printer or diskette writer
Clearing the output queue (CLROUTQ)
Deleting the spooled file using the DLTSPLF command or the delete
option from a spooled files display
Deleting spooled files when a job ends (ENDJOB SPLFILE(*YES))
Deleting spooled files when a print job ends (ENDPJ SPLFILE(*YES))
Sending a spooled file to a remote system by a remote writer
Hold
Read
Release
Releasing a spooled file
Operations for SQL Package (*SQLPKG):
v Read operation
Run
When *SQLPKG object is run
v Change operation
None
v Operations that are not audited
PRTSQLINF
Print SQL Information
Operations for Service Program (*SRVPGM):
v Read operation
CRTPGM
An audit entry for each service program used during a CRTPGM
command
492
Object Auditing
CRTSRVPGM
An audit entry for each service program used during a CRTSRVPGM
command
QTEDBGS
Register Debug View API
QTEDBGS
Retrieve Module Views API
|
|
RTVBNDSRC
Retrieve Binder Source
UPDPGM
An audit entry for each service program used during a UPDPGM
command.
UPDSRVPGM
An audit entry for each service program used during a UPDSRVPGM
command.
v Create operation
CRTSRVPGM
Create Service Program
UPDSRVPGM
Update Service Program
v Change operation
CHGSRVPGM
Change Service Program
v Operations that are not audited
DSPSRVPGM
Display Service Program
PRTSQLINF
Print SQL Information
QBNLSPGM
List Service Program Information API
QBNRSPGM
Retrieve Service Program Information API
WRKSRVPGM
Work with Service Program
Operations for Session Description (*SSND):
v No Read or Change operations are audited for the *SSND object type.
Operations for Server Storage Space (*SVRSTG):
v No Read or Change operations are audited for the *SVRSTG object type.
Operations for Stream File (*STMF):
v Read operation
CPY
Copy
DSPLNK
Display Links
493
Object Auditing
givedescriptor
Give File Access API
MOV Move
open, open64, QlgOpen, QlgOpen64, Qp0lOpen
Open File APIs
|
|
SAV
Save
WRKLNK
Work with Links
v Change operation
ADDLNK
Add Link
CHGAUD
Change Auditing
CHGAUT
Change Authority
CHGOWN
Change Owner
CHGPGP
Change Primary Group
CHKIN
Check In
CHKOUT
Check Out
chmod, QlgChmod
Change File Authorizations APIs
|
|
chown, QlgChown
Change Owner and Group APIs
CPY
Copy
|
|
fchmod
Change File Authorizations by Descriptor API
fchown
Change Owner and Group of File by Descriptor API
givedescriptor
Give File Access API
link
MOV Move
|
|
|
|
Qp0lGetPathFromFileID, QlgGetPathFromFileID
Get Path Name of Object from File ID APIs
|
|
Qp0lRenameKeep, QlgRenameKeep
Rename File or Directory, Keep New APIs
494
Object Auditing
|
|
Qp0lRenameUnlink, QlgRenameUnlink
Rename File or Directory, Unlink New APIs
RMVLNK
Remove Link
RNM
Rename
RST
Restore
|
|
unlink, QlgUnlink
Remove Link to File APIs
|
|
utime, QlgUtime
Set File Access and Modifcation Times APIs
WRKAUT
Work with Authority
WRKLNK
Work with Links
v Operations that are not audited
close
DSPAUT
Display Authority
|
|
dup
dup2
faccessx
Determine file accessibility
fcntl
fpathconf
Get Configurable Path Name Variables by Descriptor API
|
|
fstat, fstat64
Get File Information by Descriptor APIs
fsync
|
|
ftruncate, ftruncate64
Truncate File APIs
ioctl
|
|
lseek, lseek64
Set File Read/Write Offset APIs
|
|
lstat, lstat64
Get File or Link Information APIs
|
|
pathconf, QlgPathconf
Get Configurable Path Name Variables APIs
|
|
pread, pread64
Read from Descriptor with Offset APIs
|
|
pwrite, pwrite64
Write to Descriptor with Offset APIs
read
readv
495
Object Auditing
select
|
|
takedescriptor
Take File Access API
write
Copy
DSPLNK
Display Links
MOV Move
readlink
Read Value of Symbolic Link API
SAV
Save
WRKLNK
Work with Links
v Change operation
CHGOWN
Change Owner
CHGPGP
Change Primary Group
CPY
Copy
MOV Move
|
|
Qp0lRenameKeep, QlgRenameKeep
Rename File or Directory, Keep New APIs
|
|
Qp0lRenameUnlink, QlgRenameUnlink
Rename File or Directory, Unlink New APIs
RMVLNK
Remove Link
RNM
Rename
RST
Restore
|
|
symlink, QlgSymlink
Make Symbolic Link APIs
|
|
unlink, QlgUnlink
Remove Link to File APIs
WRKLNK
Work with Links
v Operations that are not audited
lstat, lstat64, QlgLstat, QlgLstat64
Link Status APIs
|
|
496
Object Auditing
Operations for S/36 Machine Description (*S36):
v Read operation
None
v Change operation
CHGS36
Change S/36 configuration
CHGS36A
Change S/36 configuration attributes
SET SET procedure
CRTDEVXXX
When a device is added to the configuration table
DLTDEVD
When a device is deleted from the configuration table
RNMOBJ
Rename device description
v Operations that are not audited
DSPS36
Display S/36 configuration
RTVS36A
Retrieve S/36 Configuration Attributes
STRS36
Start S/36
ENDS36
End S/36
Operations for Table (*TBL):
v Read operation
QDCXLATE
Translate character string
QTBXLATE
Translate character string
QLGRTVSS
Retrieve sort sequence table
CRTLF
Translation Table during CRTLF command
Read
Use of Sort Sequence Table when running any command that can specify
a sort sequence
v Change operation
None
v Operations that are not audited
WRKTBL
Work with table
Operations for User Index (*USRIDX):
v Read operation
Appendix E. Object Operations and Auditing
497
Object Auditing
QUSRTVUI
Retrieve user index entries API
v Change operation
QUSADDUI
Add User Index Entries API
QUSRMVUI
Remove User Index Entries API
v Operations that are not audited
Access
Direct access to a user index using MI instructions (only allowed for a
user domain user index in a library specified in the QALWUSRDMN
system value.
QUSRUIAT
Retrieve User Index Attributes API
Operations for User Profile (*USRPRF):
v Read operation
None
v Change operation
CHGPRF
Change Profile
CHGPWD
Change Password
CHGUSRPRF
Change User Profile
CHKPWD
Check Password
DLTUSRPRF
Delete User Profile
GRTUSRAUT
Grant User Authority (to-user-profile)
QSYCHGPW
Change Password API
RSTUSRPRF
Restore User Profile
v Operations that are not audited
DSPPGMADP
Display Programs that Adopt
DSPUSRPRF
Display User Profile
GRTUSRAUT
Grant User Authority (from-user-profile)
PRTPRFINT
Print Profile Internals
PRTUSRPRF
Print User Profile
498
Object Auditing
QSYCUSRS
Check User Special Authorities API
QSYLOBJA
List Authorized Objects API
QSYLOBJP
List Objects That Adopt API
QSYRUSRI
Retrieve User Information API
RTVUSRPRF
Retrieve User Profile
WRKOBJOWN
Work with Owned Objects
WRKUSRPRF
Work with User Profiles
Operations for User Queue (*USRQ):
v No Read or Change operations are audited for the *USRQ object type.
v Operations that are not audited
Access
Direct access to user queues using MI instructions (only allowed for a
user domain user queue in a library specified in the QALWUSRDMN
system value.
Operations for User Space (*USRSPC):
v Read operation
QUSRTVUS
Retrieve User Space API
v Change operation
QUSCHGUS
Change User Space API
QUSCUSAT
Change User Space Attributes API
v Operations that are not audited
Access
Direct access to user space using MI instructions (only allowed for user
domain user spaces in libraries specified in the QALWUSRDMN system
value.
QUSRUSAT
Retrieve User Space Attributes API
Operations for Validation List (*VLDL):
v Read operation
QSYFDVLE
Find Validation List Entry API
v Change operation
QSYADVLE
Add Validation List Entry API
Appendix E. Object Operations and Auditing
499
Object Auditing
QSYCHVLE
Change Validation List Entry API
QSYRMVLE
Remove Validation List Entry API
v Operations that are not audited
Access
Direct access to user space using MI instructions (only allowed for user
domain user spaces in libraries specified in the QALWUSRDMN system
value.)
QUSRUSAT
Retrieve User Space Attributes API
Operations for Workstation Customizing Object (*WSCST):
v Read operation
Vary
RTVWSCST
Retrieve Workstation Customizing Object Source (only when
*TRANSFORM is specified for the device type)
SNDTCPSPLF
Send TCP/IP Spooled File (only when TRANSFORM(*YES) is specified)
STRPRTWTR
Start Printer Writer (only for spooled files that are printed to a
customized printer using the host print transform function)
STRRMTWTR
Start Remote Writer (only when output queue is configured with
CNNTYPE(*IP) and TRANSFORM(*YES))
When output is printed directly (not spooled) to a customized printer
using the host print transform function
v Change operation
Print
None
v Operations that are not audited
None
500
|
|
|
Table 142 on page 503 contains the layout for fields that are common to all entry
types when OUTFILFMT(*TYPE4) is specified on the DSPJRN command. This
layout, which is called QJORDJE4, is defined in the QADSPJR4 file in the QSYS
library. The *TYPE4 output includes all of the *TYPE2 information, plus
information about journal identifiers, triggers, and referential constraints.
Table 145 on page 506 through Table 217 on page 596 contain layouts for the model
database outfiles provided to define entry-specific data. You can use the
CRTDUPOBJ command to create any empty output file with the same layout as
one of the model database outfiles. You can use the DSPJRN command to copy
selected entries from the audit journal to the output file for analysis. Analyzing
Audit Journal Entries with Query or a Program on page 274 provides examples of
using the model database outfiles. See also the Journal Entry Information Appendix
in the Backup and Recovery book for detailed descriptions for these fields.
Table 141 contains the layout for fields that are common to all entry types when
OUTFILFMT(*TYPE5) is specified on the DSPJRN command. This layout, which is
called QJORDJE5, is defined in the QADSPJR5 file in the QSYS library. The *TYPE5
output includes all of the *TYPE4 information, plus information about the program
library, program ASP device name, program ASP device number, receiver, receiver
library, receiver ASP device name, receiver ASP device number, arm number,
thread id, address family, remote port, and remote address.
|
|
|
|
|
|
|
Table 141. Standard Heading Fields for Audit Journal Entries. QJORDJE5 Record Format (*TYPE5)
Offset
Field
Format
Description
1
6
Length of Entry
Sequence
Number
Journal Code
Entry Type
Timestamp of
Entry
Name of Job
User Name
Job Number
Zoned(5,0)
Char(20)
Char(1)
Char(2)
Char(26)
Total length of the journal entry including the entry length field.
Applied to each journal entry. Initially set to 1 for each new or restored
journal. Optionally, reset to 1 when a new receiver is attached.
Always T.
See Table 144 on page 504 for a list of entry types and descriptions.
Date and time that the entry was made in SAA timestamp format.
Char(10)
Char(10)
Zoned(6,0)
26
27
29
55
65
75
501
Field
Format
Description
81
Program Name
Char(10)
The name of the program that made the journal entry. This can also be
the name of a service program or the partial name of a class file used in
a compiled Java program. If an application program or CL program did
not cause the entry, the field contains the name of a system-supplied
program such as QCMD. The field has the value *NONE if one of the
following is true:
v The program name does not apply to this entry type.
91
Program library
101
Program ASP
Char(10)
device
Program ASP
Zoned(5,0)
number
Name of object
Char(10)
Objects Library
Char(10)
Member Name
Char(10)
Count/RRN
Char(20)
Flag
Char(1)
Commit Cycle
Char(20)
identifier
User Profile
Char(10)
System Name
Char(8)
Journal identifier Char(10)
Referential
Char(1)
Constraint
Trigger
Char(1)
Incomplete Data Char(1)
Ignored by
Char(1)
APY/RMVJRNCHG
Minimized ESD
Char(1)
Object indicator
Char(1)
System sequence Char(20)
Receiver
Char(10)
Receiver library
Char(10)
Receiver ASP
Char(10)
device
Receiver ASP
Zoned(5,0)
number
Arm number
Zoned(5,0)
Thread identifier Hex(8)
Thread identifier Char(16)
hex
Address family
Char(1)
Remote port
Zoned(5,0)
Remote address
Char(46)
Logical unit of
Char(39)
work
Transaction ID
Char(140)
Reserved
Char(20)
Null value
Char(50)
indicators
111
116
126
136
146
166
167
187
197
205
215
216
217
218
219
220
221
241
251
261
271
276
281
289
305
306
311
357
396
536
556
502
Char(10)
Field
Format
Description
606
|
|
|
|
|
Entry specific
Binary(5)
Length of the entry specific data.
data length
Note: The three fields beginning at offset 55 make up the system job name. In most cases, the User name field at
offset 65 and the User profile name field at offset 187 have the same value. For prestarted jobs, the User profile name
field contains the name of the user starting the transaction. For some jobs, both these fields contain QSYS as the user
name. The User profile name field in the entry-specific data contains the actual user who caused the entry. If an API
is used to swap user profiles, the User profile name field contains the name of the new (swapped) user profile.
Table 142. Standard Heading Fields for Audit Journal Entries. QJORDJE4 Record Format (*TYPE4)
Offset
Field
Format
Description
1
6
Length of Entry
Sequence
Number
Journal Code
Entry Type
Timestamp of
Entry
Name of Job
User Name
Job Number
Program Name
Zoned(5,0)
Zoned(10,0)
Total length of the journal entry including the entry length field.
Applied to each journal entry. Initially set to 1 for each new or restored
journal. Optionally, reset to 1 when a new receiver is attached.
Always T.
See Table 144 on page 504 for a list of entry types and descriptions.
Date and time that the entry was made in SAA timestamp format.
16
17
19
45
55
65
71
Char(1)
Char(2)
Char(26)
Char(10)
Char(10)
Zoned(6,0)
Char(10)
81
91
101
111
121
122
132
142
150
160
161
162
170
220
Object Name
Library Name
Member Name
Count/RRN
Flag
Commit Cycle ID
User Profile
System Name
Reserved
Referential
Constraint
Trigger
(Reserved Area)
Null Value
Indicators
Entry Specific
Data Length
Char(10)
Char(10)
Char(10)
Zoned(10)
Char(1)
Zoned(10)
Char(10)
Char(8)
Char(10)
Char(1)
Char(1)
Char(8)
Char(50)
Used for file journaling. Not used for audit journal entries.
Used for file journaling. Not used for audit journal entries.
Binary (4)
Note: The three fields beginning at offset 45 make up the system job name. In most cases, the User name
field at offset 55 and the User profile name field at offset 132 have the same value. For prestarted jobs, the
User profile name field contains the name of the user starting the transaction. For some jobs, both these
fields contain QSYS as the user name. The User profile name field in the entry-specific data contains the
actual user who caused the entry. If an API is used to swap user profiles, the User profile name field
contains the name of the new (swapped) user profile.
503
Field
Format
Description
1
6
Length of Entry
Sequence
Number
Journal Code
Entry Type
Timestamp
Time of entry
Name of Job
User Name
Job Number
Program Name
Zoned(5,0)
Zoned(10,0)
Total length of the journal entry including the entry length field.
Applied to each journal entry. Initially set to 1 for each new or restored
journal. Optionally, reset to 1 when a new receiver is attached.
Always T.
See Table 144 for a list of entry types and descriptions.
The system date that the entry was made.
The system time that the entry was made.
The name of the job that caused the entry to be generated.
The user profile name associated with the job1.
The job number.
The name of the program that made the journal entry. This can also be
the name of a service program or the partial name of a class file used in
a compiled Java program. If an application program or CL program did
not cause the entry, the field contains the name of a system-supplied
program such as QCMD. The field has the value *NONE if one of the
following is true:
16
17
19
25
31
41
51
57
Char(1)
Char(2)
Char(6)
Zoned(6,0)
Char(10)
Char(10)
Zoned(6,0)
Char(10)
Object Name
Library Name
Member Name
Count/RRN
Flag
Commit Cycle ID
User Profile
System Name
(Reserved Area)
Char(10)
Char(10)
Char(10)
Zoned(10)
Char(1)
Zoned(10)
Char(10)
Char(8)
Char(20)
Entry
Type
Description
AD
AF
AP
AU
CA
CD
CO
CP
CQ
CU
CV
CY
DI
DO
Auditing changes
Authority failure
Obtaining adopted authority
Attribute changes
Authority changes
Command string audit
Create object
User profile changed, created, or restored
Change of *CRQD object
Cluster Operations
Connection verification
Cryptographic Configuration
Directory Services
Delete object
504
journal
journal
journal
journal
journal
journal
entries.
entries.
entries.
entries.
entries.
entries.
The three fields beginning at offset 31 make up the system job name. In most cases, the User name field at
offset 41 and the User profile name field at offset 118 have the same value. For prestarted jobs, the User profile
name field contains the name of the user starting the transaction. For some jobs, both these fields contain
QSYS as the user name. The User profile name field in the entry-specific data contains the actual user who
caused the entry. If an API is used to swap user profiles, the User profile name field contains the name of the
new (swapped) user profile.
audit
audit
audit
audit
audit
audit
Description
DS
EV
GR
GS
IP
IR
IS
JD
JS
KF
LD
ML
NA
ND
NE
OM
OR
OW
O1
O2
O3
PA
PG
PO
PS
PW
RA
RJ
RO
RP
RQ
RU
RZ
SD
SE
SF
SG
SK
SM
SO
ST
SV
VA
VC
VF
VL
VN
VO
VP
VR
VS
505
Description
VU
VV
X0
YC
YR
ZC
ZM
ZR
| Table 145. AD (Auditing Change) Journal Entries. QASYADJE/J4/J5 Field Description File
|
Offset
JE
J4
J5
|
|
|
|
|
156
224
610
Field
Format
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
157
225
611
Object Name
Char(10)
167
177
185
235
245
253
621
631
639
Char(10)
Char(8)
Char(10)
195
263
649
196
264
650
197
265
651
198
266
652
199
267
653
200
268
654
201
269
655
202
270
656
203
271
657
204
272
658
205
273
659
206
274
660
Library Name
Object Type
Object Audit
Value
CHGUSRAUD
*CMD
CHGUSRAUD
*CREATE
CHGUSRAUD
*DELETE
CHGUSRAUD
*JOBDTA
CHGUSRAUD
*OBJMGT
CHGUSRAUD
*OFCSRV
CHGUSRAUD
*PGMADP
CHGUSRAUD
*SAVRST
CHGUSRAUD
*SECURITY
CHGUSRAUD
*SERVICE
CHGUSRAUD
*SPLFDTA
CHGUSRAUD
*SYSMGT
506
Description
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
CHGDLOAUD command
CHGOBJAUD command
U
CHGUSRAUD command
Name of the object for which auditing was
changed.
Name of the library for the object.
The type of object.
The new value specified on the CHGOBJAUD
command.
Y = Audit commands for this user.
Y = Write an audit record when this user
an object.
Y = Write an audit record when this user
an object.
Y = Write an audit record when this user
changes a job.
Y = Write an audit record when this user
or renames an object.
Y = Write an audit record when this user
performs office functions.
Y = Write an audit record when this user
authority through adopted authority.
Y = Write an audit record when this user
or restores objects.
Y = Write an audit record when this user
performs security-relevant actions.
Y = Write an audit record when this user
performs service functions.
Y = Write an audit record when this user
manipulates spooled files.
Y = Write an audit record when this user
system management changes.
creates
deletes
moves
obtains
saves
makes
Offset
JE
J4
J5
Field
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
207
275
661
208
276
662
227
295
681
239
307
693
247
310
315
701
378
764
396
782
330
398
784
334
402
788
336
404
790
339
407
793
342
410
796
358
426
812
374
442
954
970
980
985
828
1340
1356
1366
1371
989
1375
991
1377
994
1380
996
1382
|
|
|
|
|
|
|
(Reserved
Area)
Folder Path
(Reserved
Area)
(Reserved
Area)
Object Name
Length 1
Object Name
CCSID1
Object Name
Country or
Region ID1
Object Name
Language ID1
(Reserved
area)
Parent File
ID1,2
Object File
ID1,2
Object Name1
Object File ID
ASP Name5
ASP Number5
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Format
Description
Y = Write an audit record when this user
accesses optical devices.
Char(8)
Char(63)
Char(20)
Char(18)
Binary(4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
997
1383
1013
1399
Relative File
ID3
Absolute Path
Name4
507
Offset
JE
These fields are used only for objects in the QOpenSys, "root" file systems, and user-defined file systems.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the absolute path name indicator (offset 996) is N, this field will contain the relative field ID of the
path name. When the absolute path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first two bytes contain the length of the path name.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
J4
J5
Field
Format
Description
| Table 146. AF (Authority Failure) Journal Entries. QASYAFJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
508
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503, and
Table 143 on page 504 for field listing.
Offset
| JE
J4
J5
Field
| 156
|
224
610
Format
Description
A
Restricted instruction
|
|
|
|
I7
|
|
|
|
|
|
|
|
| 157
|
| 167
| 177
Z
225
611
Object Name
1,
Char(10)
Char(10)
Char(8)
235
245
621
631
Library Name
Object Type
509
Offset
JE
J4
J5
Field
Format
Description
|
|
185
253
639
Validation
Error Action
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Zoned(7,0)
Char(10)
186
196
206
212
222
254
264
274
280
290
640
650
660
666
676
232
300
686
242
310
696
252
320
706
259
327
713
510
Job Name
User Name
Job Number
Program Name
Program
Library
User Profile 2
Work Station
Name
Program
Instruction
Number
Field name
Char(10)
Char(10)
Zoned(6,0)
Char(10)
Char(10)
Char(10)
Char(10)
Offset
| JE
J4
J5
Field
| 269
|
337
723
Operation
Char(3)
Violation Code
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Format
Description
The type of operation violation that occurred, set
only if the violation type (offset 224) is X.
Service tool user profile not authorized
to perform hardware configuration
operation (QYHCHCOP).
The name of the office user.
The name of the document library object.
HCA
272
282
294
340
350
362
726
736
748
302
365
370
433
756
819
375
443
829
461
847
395
463
849
399
467
853
401
469
855
404
472
858
407
475
861
423
491
877
439
507
1019
1035
1045
1050
893
1405
1421
1431
1436
1054
1440
1056
1442
1059
1445
1061
1447
Office User
DLO Name
(Reserved
Area)
Folder Path
Office on
Behalf of User
(Reserved
Area)
(Reserved
Area)
Object Name
Length3
Object Name
CCSID3
Object Name
Country or
Region ID3
Object Name
Language ID3
(Reserved
area)
Parent File
ID3,4
Object File
ID3,4
Object Name3,6
Object File ID
ASP Name10
ASP Number10
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(10)
Char(12)
Char(8)
Char(63)
Char(10)
Char(20)
Char(18)
Binary(4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
Char(1)
511
Offset
JE
|
|
|
|
|
|
|
|
J4
J5
Field
Format
Description
1062
1448
Char(16)
1078
1464
Relative File
ID8
Absolute Path
Name9
ASP program
library name
ASP program
library number
Char(5002)
Char(10)
Char(5)
6466
6476
|
|
|
When the violation type is for description G, the object name contains the name of the *SRVPGM that
contained the exit that detected the error. For more information about the violation types, see Table 117 on
page 255.
|
|
|
|
This field contains the name of the user that caused the entry. QSYS may be the user for the following:
|
|
These fields are used only for objects in the QOpenSys file system, the "root" file system, user-defined file
systems, and QFileSvr.400.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the violation type is T, the object name contains the TCP/IP port the user is not authorized to use.
The value is left justified and blank filled. The object library and object type fields will be blank.
|
|
When the violation type is O, the optical object name is contained in the IFS object name field. The Country
or Region ID, language ID, parent file ID, and object file ID fields will all contain blanks.
|
|
The Java class object being created may not extend its base class because the base class has system Java
attributes.
|
|
When the absolute path name indicator (offset 1061) is N, this field will contain the relative file ID of the
path name. When the absolute path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
|
10
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
| Table 147. AP (Adopted Authority) Journal Entries. QASYAPJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
|
224
610
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503, and
Table 143 on page 504 for field listing.
Entry Type
Char(1)
Start
End
|
|
| 157
|
| 167
| 177
512
225
611
Object Name
Char(10)
235
245
621
631
Library name
Object Type
Char(10)
Char(8)
Offset
| JE
J4
J5
Field
Format
Description
| 185
|
| 195
|
|
253
639
Char(10)
263
279
289
649
665
675
Owning User
Profile
Object File ID
ASP Name1
ASP Number1
|
|
|
Char(16)
Char(10)
Char(5)
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
| Table 148. AU (Attribute Changes) Journal Entries. QASYAUJ5 Field Description File
|
Offset
| J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Entry type
Action
Name
New value length
New value CCSID
New value Country
or Region ID
New value
language ID
New value
Old value length
Old value CCSID
Old value Country
or Region ID
Old value language
ID
Old value
Char(1)
Char(3)
Char(100)
Binary(4)
Binary(5)
Char(2)
Type of entry
Action
Name
New value length
New value CCSID
New value Country or Region ID
Char(3)
610
611
614
714
716
720
722
725
2727
2729
2733
2735
2738
| 1
|
Char(2002)
Binary(4)
Binary(5)
Char(2)
Char(3)
Char(2002)
New value
Old value length
Old value CCSID
Old value Country or Region ID
Old value language ID
Old value
This is a variable length field. The first 2 bytes contain the length of the field.
| Table 149. CA (Authority Changes) Journal Entries. QASYCAJE/J4/J5 Field Description File
|
Offset
JE
J4
J5
|
|
|
|
156
224
610
157
167
177
185
225
235
245
253
195
263
|
|
|
|
|
|
|
|
|
Field
Format
Description
Entry Type
Char(1)
611
621
631
639
Object Name
Library Name
Object Type
User Name
Char(10)
Char(10)
Char(8)
Char(10)
649
Authorization
List Name
Char(10)
A
Changes to authority
The name of the object.
The name of the library the object is in.
The type of object.
The name of the user profile whose authority is
being granted or revoked.
The name of the authorization list.
Authorities granted or removed:
Appendix F. Layout of Audit Journal Entries
513
Offset
| JE
J4
J5
Field
Format
| 205
||
| 206
||
| 207
||
| 208
||
|
| 209
||
| 210
|
| 211
|
| 212
||
| 213
||
| 214
||
| 215
||
| 216
||
| 217
||
|
| 218
|
| 222
|
|
273
659
Char(1)
274
660
275
661
276
662
277
663
278
664
Object
Existence
Object
Management
Object
Operational
Authorization
List
Management
Authorization
List
Read Authority
279
665
280
666
281
667
282
668
283
669
284
670
285
671
286
672
290
676
Update
Authority
Delete
Authority
Exclude
Authority
Execute
Authority
Object Alter
Authority
Object
Reference
Authority
(Reserved
Area)
Command
Type
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Description
Y
*OBJEXIST
*OBJMGT
*OBJOPR
*AUTLMGT
*READ
*ADD
*UPD
*DLT
*EXCLUDE
*EXECUTE
*OBJALTER
*OBJREF
Char(4)
Char(3)
Grant
RPL
RVK
Revoke
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
225
235
293
303
679
689
245
255
267
313
323
335
699
709
721
275
338
343
406
729
792
348
416
349
350
514
Char(10)
Char(10)
802
Field name
(Reserved
Area)
Office User
DLO Name
(Reserved
Area)
Folder Path
Office on
Behalf of User
Personal Status
417
803
Access Code
Char(1)
418
804
Access Code
Char(4)
USR
GRTUSRAUT operation
The name of the field.
Char(10)
Char(12)
Char(8)
Char(63)
Char(10)
Char(1)
R
Access code removed
Access code.
Offset
| JE
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
J4
J5
354
422
808
440
826
374
442
828
378
446
832
380
448
834
383
386
451
454
837
840
402
470
856
418
486
998
1014
1024
1029
872
1384
1400
1410
1415
1033
1419
1035
1421
1038
1424
1040
1426
|
|
|
|
|
|
|
Field
Format
(Reserved
Area)
(Reserved
Area)
Object Name
Length 1
Object Name
CCSID1
Object Name
Country or
Region ID1
Object Name
Language ID1
(Reserved area)
Parent File
ID1,2
Object File
ID1,2
Object Name1
Object File ID
ASP Name5
ASP Number5
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(20)
Description
Char(18)
Binary(4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
1041
1427
1057
1443
Relative File
ID3
Absolute Path
Name4
|
|
These fields are used only for objects in the QOpenSys file system, the "root" file system, user-defined file
systems, and QFileSvr.400.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the path name indicator (offset 1040) is N, this field will contain the relative file ID of the path
name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
515
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
Command run
OCL statement
S/36 procedure
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
U
Utility control statement
The name of the object.
The name of the library the object is in.
The type of object.
157
167
177
185
225
235
245
253
611
621
631
639
Object Name
Library Name
Object Type
Run from a CL
program
Char(10)
Char(10)
Char(8)
Char(1)
186
254
640
Command
string
ASP name for
command
library
ASP number
for command
library
Char(6000)
N
No
The command that was run, with parameters.
Char(10)
Char(5)
6640
6650
Yes
| Table 151. CO (Create Object) Journal Entries. QASYCOJE/J4/J5 Field Description File
|
Offset
JE
J4
J5
|
|
|
|
156
224
610
Field
Entry Type
Format
Description
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
N
157
167
177
185
225
235
245
253
611
621
631
639
205
215
227
273
283
295
659
669
681
235
303
689
516
Object Name
Library Name
Object Type
(Reserved
Area)
Office User
DLO Name
(Reserved
Area)
Folder Path
Char(10)
Char(10)
Char(8)
Char(20)
R
Replacement of existing object
The name of the object.
The name of the library the object is in.
The type of object.
Char(10)
Char(12)
Char(8)
Char(63)
Offset
JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
298
366
752
Office on
Behalf of User
(Reserved
Area)
(Reserved
Area)
Object Name
Length
Object Name
CCSID1
Object Name
Country or
Region ID1
Object Name
Language ID1
(Reserved
area)
Parent File
ID1,2
Object File
ID1,2
Object Name1
Object File ID
ASP Name5
ASP Number5
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(10)
|
|
|
|
|
|
|
308
376
762
394
780
328
396
782
332
400
786
334
402
788
337
405
791
340
408
794
356
424
810
372
440
952
968
978
983
826
1338
1354
1364
1369
987
1373
989
1375
992
1378
994
1380
Char(20)
Char(18)
Binary(4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
995
1381
1011
1397
Relative File
ID3
Absolute Path
Name4
517
Offset
JE
These fields are used only for objects in the QOpenSys, "root" file systems, and user-defined file systems.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the path name indicator (offset 994) is N, this field will contain the relative file ID of the path name.
When the path name indicator is Y, this field will contain 16 bytes of hex zeroes..
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
J4
J5
Field
Format
Description
| Table 152. CP (User Profile Changes) Journal Entries. QASYCPJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
225
611
235
245
256
621
631
639
|
| 157
|
| 167
| 177
| 185
|
|
Field
Format
Description
Entry Type
Char(1)
User Profile
Name
Library Name
Object Type
Command
Name
Char(10)
A
Change to a user profile
The name of the user profile that was changed.
Char(10)
Char(8)
Char(3)
CRTUSRPRF
CHG
CHGUSRPRF
RST
RSTUSRPRF
DST
Password changed
Password is *NONE.
|
|
||
|
||
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
188
256
642
189
257
643
190
258
644
191
259
645
192
260
646
193
261
647
194
262
648
518
Password
Changed
Password
*NONE
Password
Expired
Char(1)
All Object
Special
Authority
Job Control
Special
Authority
Save System
Special
Authority
Security
Administrator
Special
Authority
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Offset
| JE
J4
J5
Field
Format
|
||
|
|
||
|
||
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
195
263
649
Char(1)
196
264
650
197
265
651
198
266
652
199
267
653
212
222
280
290
666
676
Spool Control
Special
Authority
Service Special
Authority
Audit Special
Authority
System
Configuration
Special
Authority
(Reserved
Area)
Group Profile
Owner
232
300
686
Char(10)
242
252
310
320
696
706
262
272
330
340
716
726
282
350
736
292
360
746
302
312
313
323
370
380
381
391
756
766
767
777
333
401
787
483
551
937
493
561
947
Group
Authority
Initial Program
Initial Program
Library
Initial Menu
Initial Menu
Library
Current
Library
Limited
Capabilities
User Class
Priority Limit
Profile Status
Group
Authority Type
Supplemental
Group Profiles
User
Identification
Group
Identification
Char(1)
Char(1)
Char(1)
Description
Y
Char(13)
Char(10)
Char(10)
Char(10)
Char(10)
Char(10)
The name
The name
is found.
The name
The name
found.
The name
Char(10)
Char(10)
Char(1)
Char(10)
Char(10)
Char(150)
Char(10)
Char(10)
Char(10)
Char(10)
| Table 153. CQ (*CRQD Changes) Journal Entries. QASYCQJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
225
235
611
621
|
| 157
| 167
Field
Format
Description
Entry Type
Char(1)
Object Name
Library Name
Char(10)
Char(10)
A
Change to a *CRQD object
The name of the object that was changed.
The name of the object library.
Appendix F. Layout of Audit Journal Entries
519
Offset
JE
J4
J5
Field
Format
Description
|
|
|
|
177
245
631
639
649
Object Type
ASP name
ASP number
Char(8)
Char(10)
Char(5)
| Table 154. CU (Cluster Operations) Journal Entries. QASYCUJ4/J5 Field Description File
|
Offset
| JE
J4
J5
|
|
|
|
224
610
Field
Entry Type
Format
Description
Char(1)
|
|
|
R
225
611
Entry Action
Char(3)
Add
Add
CRT
Create
DLT
Delete
DST
Distribute
END
End
FLO
Fail over
LST
List information
RMV
Remove
STR
Start
SWT
Switch
|
|
228
614
Status
Char(3)
UPC
Update attributes
The status of the request.
ABN
|
|
AUT
END
|
|
|
|
|
|
|
|
|
|
|
231
241
251
261
520
617
627
637
647
CRG Object
Name
Char(10)
CRG Library
Name
Char(10)
Cluster Name
Node ID
Char(10)
Char(8)
STR
The request was started
The Cluster Resource Group object name.
This value is filled in when the entry
type is R.
The Cluster Resource Group object library.
Note:
Note:
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
269
655
Char(8)
277
663
Char(10)
287
673
297
683
Source Node
ID
Source User
Name
User Queue
Name
User Queue
Library
ASP name
ASP number
Char(10)
Char(10)
Char(5)
693
703
Char(10)
| Table 155. CV (Connection Verification) Journal Entries. QASYCVJ4/J5 Field Description File
|
|
|
|
|
|
Offset
JE
J4
J5
224
610
Field
Entry Type
Format
Description
Char(1)
Connection established
Connection ended
|
|
225
611
Action
Char(1)
R
Connection rejected
Action taken for the connection type.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
U
226
612
Point to Point
Profile Name
Char(10)
521
Offset
JE
J4
J5
Field
Format
Description
236
622
Protocol
Char(10)
L2TP
PPP
|
|
|
||
|
246
632
Local
Char(10)
Authentication
Method
SLIP
Serial Line Internet Protocol.
The type of entry.
CHAP
PAP
|
|
|
|
||
|
SCRIPT
256
642
Remote
Char(10)
Authentication
Method
Script method.
The type of entry.
CHAP
PAP
|
|
RADIUS
Radius method.
|
|
|
|
|
|
|
|
|
|
|
SCRIPT
266
276
286
652
662
672
386
772
426
812
466
852
Object Name
Library Name
*VLDL User
Name
Local IP
Address
Remote IP
Address
IP forwarding
Char(10)
Char(10)
Char(100)
Script method.
The *VLDL object name.
The *VLDL object library name.
The *VLDL user name.
Char(40)
Char(40)
Char(1)
IP forwarding is on.
IP forwarding is off.
522
Offset
JE
J4
J5
Field
Format
Description
467
853
Proxy ARP
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
Y
468
478
854
864
518
904
532
918
546
932
548
934
Radius Name
Authenticating
IP Address
Account Sesion
ID
Account
Multi-Session
ID
Account Link
Count
Tunnel Type
Char(10)
Char(40)
N
Proxy ARP is not enabled.
The AAA profile name.
The authenticating IP address.
Char(14)
Char(14)
Binary(4)
Char(1)
Not tunneled
L2TP
AH
|
|
|
|
|
|
|
|
|
|
|
|
|
549
935
589
975
629
1015
637
1023
1025
1035
Tunnel Client
Endpoint
Tunnel Server
Endpoint
Account
Session Time
Account
Terminate
Cause
ASP name
ASP number
Char(40)
9
ESP
Tunnel client endpoint.
Char(40)
Char(8)
Binary(4)
Char(10)
Char(5)
| Table 156. CY (Cryptographic Configuration) Journal Entries. QASYCYJ4/J5 Field Description File
|
Offset
| JE
J4
J5
|
|
|
|
224
610
Field
Entry Type
Format
Description
Char(1)
523
Offset
| JE
J4
J5
Field
Format
Description
|
|
225
611
Action
Char(3)
CCP
CCR
CLK
Set clock.
CLR
CRT
DCP
DCR
DST
EID
FCV
Load/clear FCV.
INI
Reinitialize card..
QRY
RCP
RCR
RCV
SET
|
|
|
|
|
228
236
244
614
622
630
Card profile
Card Role
Device Name
Char(8)
Char(8)
Char(10)
SHR
Cloning shares.
The name of the card profile..
The role of the card profile.
The name of the cryptographic device.
| Table 157. DI (Directory Services) Journal Entries. QASYDIJ4/J5 Field Description File
|
Offset
| JE
J4
J5
|
|
|
|
224
610
Field
Entry Type
Format
Description
Char(1)
524
LDAP Operation
Offset
JE
J4
J5
Field
Format
Description
225
611
Operation
Type
Char(2)
AF
Authority failure.
BN
Successful bind.
CA
CF
Configuration change.
CO
Object create.
CP
Password change.
DO
Object delete.
EX
IM
OM
OW
Ownership change.
PW
Password fail.
UB
Successful unbind.
ZC
Object change.
|
|
|
227
613
Authority
Failure Code
Char(1)
ZR
Object read.
Code for authority failures. This field is used
only if the operation type (offset 225) is AF.
|
|
|
|
|
|
|
|
228
614
Configuration
Change
Char(1)
R
Unauthorized read (search) attempt.
Configuration changes. This field is only used if
the operation type (offset 225) is CF.
Administrator ND change
525
Offset
JE
|
|
J4
J5
Field
Format
Description
229
615
Configuration
Change Code
Char(1)
|
|
|
|
230
616
M
Item modified
Indicates the new setting of the owner or ACL
propagate value. This field is used only if the
operation type (offset 225) is CA or OW.
T
|
|
|
|
|
|
|
231
617
251
637
Bind
Char(20)
Authentication
Choice
LDAP Version Char(4)
F
False
The bind authentication choice. This field is used
only if the operation type (offset 225) is BN.
Version of client making request. This field is
used only if the operation was done through the
LDAP server.
2
|
|
|
|
255
641
SSL Indicator
Char(1)
|
256
642
Request Type
Char(1)
LDAP Version 2
3
LDAP Version 3
Indicates if SSL was used on the request. This
field is used ony if the operation was done
through the LDAP server.
0
|
|
|
True
No
1
Yes
The type of request. This field is used only if the
operation was done through the LDAP server.
Authenticated
Anonymous
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
526
257
643
Connection ID
Char(20)
277
663
Client IP
Address
Char(50)
327
713
Bin(5)
331
717
333
2335
719
2721
2339
2725
2341
4343
2727
4729
User Name
CCSID
User Name
Length
User Name1
Object Name
CCSID
Object Name
Length
Object Name1
Owner Name
CCSID
Bin(4)
Char(2002)
Bin(5)
Bin(4)
Char(2002)
Bin(5)
U
Unauthenticated
Connection ID of the request. This field is used
only if the operation was done through the
LDAP server.
IP address and port number of the client request.
This field is used only if the operation was done
through the LDAP server.
The coded character set identifier of the user
name.
The length of the user name.
The name of the LDAP user.
The coded character set identifier of the object
name.
The length of the object name.
The name of the LDAP object.
The coded character set identifier of the owner
name. This field is used only if the operation
type (offset 225) is OW.
Offset
JE
J4
J5
Field
Format
Description
4347
4733
Bin(4)
4349
4735
Owner Name
Length
Owner Name1
6351
6737
New Name
CCSID
Char(2002)
Bin(5)
6355
6741
New Name
Length
Bin(4)
6357
6743
New Name1
Char(2002)
8359
8375
8385
8390
8745
8761
8771
8776
8394
8780
8396
8782
8399
8785
8401
8787
Char(16)
Char(10)
Char(5)
Bin(5)
Char(2)
Char(3)
Bin(4)
Char(1)
527
Offset
JE
|
|
|
|
J4
J5
Field
Format
Description
8402
8788
Char(16)
8418
8804
Relative File
ID2,3
Absolute Path
Name1,2
Char(5002)
This is a variable length field. The first 2 bytes contain the length of the value in the field.
These fields are used only if the operation type (offset 225) is EX or IM.
|
|
|
When the path name indicator (offset 8401) is N, this field will contain the relative file ID of the path
name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
| Table 158. DO (Delete Operation) Journal Entries. QASYDOJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
R
157
167
177
185
225
235
245
253
611
621
631
639
205
215
227
273
283
295
659
669
681
235
298
303
366
689
752
308
328
528
376
762
394
780
396
782
Object Name
Library Name
Object Type
(Reserved
Area)
Office User
DLO Name
(Reserved
Area)
Folder Path
Office on
Behalf of User
(Reserved
Area)
(Reserved
Area)
Object Name
Length 1
Object Name
CCSID1
Char(10)
Char(10)
Char(8)
Char(20)
Char(10)
Char(12)
Char(8)
Char(63)
Char(10)
Char(20)
Char(18)
Binary(4)
Binary(5)
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
332
400
786
Char(2)
334
402
788
Char(3)
337
405
791
340
408
794
356
424
810
372
440
952
968
978
983
826
1338
1354
1364
1369
987
1373
989
1375
992
1378
994
1380
Object Name
Country or
Region ID1
Object Name
Language ID1
(Reserved
area)
Parent File
ID1,2
Object File
ID1,2
Object Name1
Object File ID
ASP Name5
ASP Number5
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
|
|
|
|
|
|
|
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(10)
Char(5)
Binary5)
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
995
1381
1011
1397
Relative File
ID3
Absolute Path
Name4
These fields are used only for objects in the QOpenSys, "root" file systems, and user-defined file systems.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the path name indicator (offset 994) is N, this field will contain the relative file ID of the path name.
When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
529
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
|
|
|
|
| 157
||
||
| 158
|
|
225
611
226
612
IBM-Supplied
Service Tools
User ID Reset
Service Tools
User ID Type
Char(1)
Char(10)
*FULL
|
|
| 168
|
|
| 176
|
|
||
|
|
|
|
|
|
|
|
|
*BASIC
236
622
244
630
245
631
255
641
Service Tools
User ID New
Name
Service Tools
User ID
Password
Change
Char(8)
Char(1)
Service Tools
User ID New
Name
Service Tools
User ID
Requesting
Profile
Char(10)
Char(10)
| Table 160. EV (Environment Variable) Journal Entries. QASYEVJ4/J5 Field Description File
|
Offset
| JE
J4
J5
|
|
|
|
224
610
Field
Entry Type
Format
Description
Char(1)
Add
Change
Delete
530
Offset
| JE
J4
J5
Field
Format
Description
|
|
225
611
Name
Truncated
Char(1)
|
|
|
|
|
|
|
|
N
226
230
232
612
616
618
1234
1620
CCSID
Length
Environment
Variable Name2
New Name
Truncated1
Binary(5)
Binary(4)
Char(1002)
Char(1)
|
|
|
|
|
|
|
|
|
|
N
1235
1621
1239
1625
1241
1627
New Name
CCSID1
New Name
Length1
New
Environment
Variable
Name1,2
Binary(5)
Binary(4)
Char (1002)
|
|
This is a variable length field. The first two bytes contain the length of the environment variable name.
| Table 161. GR (Generic Record) Journal Entries. QASYGRJ4/J5 Field Description File
|
Offset
| JE
J4
J5
|
|
|
|
224
610
Field
Entry Type
Format
Description
Char(1)
|
|
225
611
Action
Char(2)
|
|
|
|
|
|
|
R
Exit program replaced
The action performed.
ZC
227
237
613
623
User Name
Field 1 CCSID
Change
Char(10)
ZR
Read
User profile name
Binary (5)
531
Offset
| JE
J4
J5
Field
Format
Description
|
|
241
243
627
629
Field 1 Length
Field 1
Binary (4)
Char(102)1
|
|
|
|
|
*REGISTER:
Function has been registered
|
|
*REREGISTER:
Function has been updated
|
|
*DEREGISTER:
Function has been de-registered
|
|
|
*CHGUSAGE:
Function usage information has
changed
|
|
|
*CHKUSAGE:
Function usage was checked for a user
and the check passed
|
|
|
|
|
|
|
|
|
Binary (5)
Binary (4)
Char (102)1
*USAGEFAILURE:
Function usage was checked for a user
and the check failed
For entry types A, D, and R, this field will
contain the exit program information for the
specific function that was performed.
The CCSID value for field 2.
The length of the data in field 2.
Field 2 data
Binary (5)
Binary (4)
345
349
351
|
|
|
|
453
457
532
731
735
737
839
843
Field 2 CCSID
Field 2 Length
Field 2
Field 3 CCSID
Field 3 Length
Offset
| JE
J4
J5
Field
Format
Description
459
845
Field 3
Char(102)1
Field 3 data.
|
|
|
|
|
|
|
|
*REGISTER:
When the operation is *REGISTER, this
field contains the default usage value.
The user name will be *DEFAULT.
|
|
|
|
|
*REREGISTER:
When the operation is *REREGISTER,
this field contains the default usage
value. The user name will be
*DEFAULT.
|
|
|
|
|
|
|
|
*CHGUSAGE:
When the operation is *CHGUSAGE,
this field contains the usage value for
the user specified in the user name
field.
The CCSID value for field 4.
The length of the data in field 4.
Field 4 data.
561
565
567
947
951
953
Field 4 CCSID
Field 4 Length
Field 4
Binary (5)
Binary (4)
Char(102)1
|
|
|
|
*REGISTER
|
|
*REREGISTER
|
|
This is a variable length field. The first 2 bytes contain the length of the field.
| Table 162. GS (Give Descriptor) Journal Entries. QASYGSJE/J4/J5 Field Description File
|
|
|
|
|
|
Offset
JE
156
J4
J5
224
610
Field
Entry Type
Format
Description
Char(1)
Give descriptor
Received descriptor
|
|
|
|
157
167
177
225
235
245
611
621
631
Job Name
User Name
Job Number
Char(10)
Char(10)
Zoned (6,0)
U
Unable to use descriptor
The name of the job.
The name of the user.
The number of the job.
533
Offset
JE
J4
J5
Field
Format
Description
|
|
|
|
|
183
251
637
Char (10)
261
647
User Profile
Name
JUID
Char (10)
| Table 163. IP (Interprocess Communication) Journal Entries. QASYIPJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
create
Delete
Authority failure
Get
|
|
| 157
Z
225
611
IPC Type
Char(1)
Shared memory
Normal semaphore
Message queue
|
|
|
|
|
|
|
158
162
172
182
226
230
240
250
612
616
626
636
IPC Handle
New Owner
Old Owner
Owner
Authority
Binary(5)
Char(10)
Char(10)
Char(3)
|
|
|
|
|
|
|
185
195
205
253
263
273
639
649
659
New Group
Old Group
Group
Authority
Char(10)
Char(10)
Char(3)
S
Semaphore
IPC handle ID
New owner of IPC entity
Old owner of IPC entity
Owners authority to IPC entity
*R
read
*W
write
*RW
read and write
Group associated with IPC entity
Previous group associated with IPC entity
Groups authority to IPC entity
*R
read
*W
write
*RW
534
Offset
| JE
J4
J5
Field
Format
Description
| 208
|
|
276
662
Public
Authority
Char(3)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
211
279
665
216
283
669
218
285
671
CCSID
Semaphore
Name
Length
Semaphore
Name
Semaphore
Name
*R
read
*W
write
Binary(5)
*RW
read and write
The CCSID of the semaphore name.
Binary(4)
Char(2050)
| Table 164. IR (IP Rules Actions) Journal Entries. QASYIRJ4/J5 Field Description File
|
Offset
| JE
J4
J5
|
|
|
|
224
610
Field
Entry Type
Format
Description
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
225
611
235
245
263
621
631
649
265
651
269
655
271
657
274
660
File Name
File Library
Reserved
File Name
Length
File Name
CCSID1
File Country
or Region ID1
File Language
ID1
Reserved
Char(10)
Char(10)
Char(18)
Binary (4)
Binary (5)
U
IP rules have been unloaded (removed).
The name of the QSYS file used to load or
receive the IP rules.
This value is blank if the file used was
not in the QSYS file system.
The name of the QSYS file library.
The length of the file name.
Char(2)
Char(3)
Char(3)
535
Offset
JE
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
J4
J5
Field
Format
277
663
Description
The file ID of the parent directory.
293
679
|
|
|
|
|
|
|
309
821
695
1207
861
877
887
892
1247
1263
1273
1278
896
1282
898
1284
901
1287
903
1289
File Name1
Connection
sequence
Object File ID
ASP Name
ASP Number5
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(512)
Char(40)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
904
1290
920
1306
Relative File
ID3
Absolute Path
Name4
These fields are used only for objects in the QOpenSys file system and the root file system.
If the ID has the left-most bit set and the rest of the bits zero, the ID is not set.
|
|
When the path name indicator (offset 903) is N this field will contain the relative file ID of the path name.
When the path name indicator is Y, this field will contain 16 bytes of hex zeroes..
This is a variable length field. The first two bytes contain the length of the field.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
| Table 165. IS (Internet Security Management) Journal Entries. QASYISJ4/J5 Field Description File
|
Offset
| JE
J4
J5
|
|
|
536
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501 and Table 142 on page 503
for field listing.
Offset
| JE
J4
J5
Field
Format
Description
224
610
Entry Type
Char(1)
|
|
|
|
|
|
|
|
|
|
|
225
611
240
626
245
631
260
646
265
521
651
907
Local IP
Address
Local Client ID
Port
Remote IP
Address
Remote Client
ID Port
Mobile ID
Result Code
Char(15)
2
IKE Phase 2 SA Negotiation
Local IP Address.
Char(5)
Char (15)
Remote IP address.
Char (5)
Char (256)
Char(4)
Successful
|
|
|
130
|
|
|
|
|
|
|
|
|
|
|
525
911
CCSID
Bin(5)
82xx
iSeries VPN Key Manager specific errors
The coded character set identifier for the
following fields:
v Local ID
v Local Client ID Value
v Remote ID
529
785
915
1171
Local ID
Char(256)
Local Client ID Char(2)
Type
IP version 4 address
IP version 4 subnet
Distinguished name
|
|
|
|
|
|
787
1173
1043
1429
1047
1433
11
Key identifier
Local client ID (valid for phase 2)
Local client ID protocol (valid for phase 2)
Remote IKE identifier
537
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
1303
1689
Remote Client
ID Type
Char(2)
IP version 4 address
IP version 4 subnet
Distinguished name
|
|
|
|
|
|
|
1305
1691
1561
1947
Remote Client
ID Value
Remote Client
ID Protocol
Char(256)
11
Key identifier
Remote client ID (valid for phase 2)
Char(4)
| Table 166. JD (Job Description Change) Journal Entries. QASYJDJE/J4/J5 Field Description File
|
Offset
JE
J4
J5
|
|
|
|
156
224
610
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Field
Entry Type
Format
Description
Char(1)
A
157
225
611
167
177
185
235
245
253
621
631
639
Library Name
Object Type
Command
Type
Char(10)
Char(8)
Char(3)
CHG
188
256
642
Old User
Char(10)
198
266
652
New User
Char(10)
662
672
ASP name
ASP number
Char(10)
Char(5)
538
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
ENDJOBABN command
Submit
Change
End
Hold
Disconnect
ENDJOB command
Release
Start
|
|
CHGUSRTRC
|
|
| 157
V
225
611
Job Type
Char(1)
Autostart
Batch
Interactive
Subsystem monitor
Reader
System
Writer
SCPF
539
Offset
JE
J4
J5
Field
Format
Description
158
226
612
Job Subtype
Char(1)
' '
No subtype
Batch immediate
Prestart
Print driver
Query
MRT
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Char(10)
U
Alternate spool user
The first part of the qualified job name being
operated on
The second part of the qualified job name being
operated on
The third part of the qualified job name being
operated on
The name of the device
The name of the effective user profile for the
thread
The name of the job description for the job
Char(10)
Char(10)
Char(10)
Char(10)
Char(10)
Char(10)
Char(430)
Char(10)
159
227
613
Job Name
Char(10)
169
237
623
Char(10)
179
247
633
Job Number
Char(6)
185
195
253
263
639
649
Char(10)
Char(10)
205
273
659
215
283
669
225
293
679
235
303
689
245
313
699
255
323
709
265
275
705
333
343
773
719
729
1159
715
783
1169
933
1319
Device Name
Effective User
Profile2
Job Description
Name
Job Description
Library
Job Queue
Name
Job Queue
Library
Output Queue
Name
Output Queue
Library
Printer Device
Library List2
Effective Group
Profile Name2
Supplemental
Group Profiles2
JUID
Description
Char(150)
Char(1)
' '
|
|
|
|
|
|
|
|
|
540
934
944
1320
1330
954
1340
JUID Field
Real User
Profile
Saved User
Profile
Char(10)
Char(10)
Char(10)
Offset
JE
|
|
|
|
|
|
|
J4
J5
Field
Format
Description
964
1350
Char(10)
974
1360
984
1370
Real Group
Profile
Saved Group
Profile
Real User
Changed3
|
|
|
|
985
|
|
|
|
986
|
|
|
|
987
|
|
|
|
988
|
|
|
|
989
|
|
|
||
|
|
|
|
|
|
|
|
|
990
1371
1372
1373
1374
1375
1376
991
1377
993
1379
3631
3641
3651
Char(10)
Char(1)
Yes
Effective User
Changed3
Char(1)
Saved User
Changed3
Char(1)
Real Group
Changed3
Char(1)
Effective Group
Changed3
Char(1)
Saved Group
Changed3
Char(1)
Supplemental
Groups
Changed3
Char(1)
Library list
Number4
Library List
Extension4,5
Library ASP
group
ASP name
ASP number
Bin(4)
N
No
The effective user profile was changed.
Yes
N
No
The saved user profile was changed
Yes
N
No
The real group profile was changed.
Yes
N
No
The effective group profile was changed
Yes
N
No
The saved group profile was changed.
Yes
N
No
The supplemental group profiles were changed.
Yes
Char(2252)
N
No
The number of libraries in the library list
extension field (offset 993).
The extension to the library list for the job.
Char(10)
Char(10)
Char(5)
This field is blank if the job is on the job queue and has not run.
|
|
|
When the JS audit record is generated because one job performs an operation on another job then this field
will contain data from the initial thread of the job that is being operated on. In all other cases, the field will
contain data from the thread that performed the operation.
This field is used only if the number of libraries in the library list exceeds the size of the field at offset 343.
|
|
This is a variable length field. The first two bytes contain the length of the data in the field.
541
Offset
| JE
J4
J5
|
|
|
|
224
610
Field
Entry Type
Format
Description
Char(1)
Certificate operation
Password incorrect
|
|
|
|
225
611
Certificate
Operation
Char(3)
T
Trusted root operation
Type of action4.
ADK
ADD
Certificate added
REQ
Certificate requested
|
|
|
|
228
614
Key Ring
Operation
Char(3)
SGN
Certificate signed
Type of action5.
ADD
DFT
EXP
IMP
LST
PWD
RMV
INF
|
|
2DB
|
|
|
|
|
|
2YR
231
617
Trusted Root
Operation
Char(3)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
542
234
252
620
638
254
640
258
644
260
646
263
266
649
652
Reserved
Object Name
Length
Object Name
CCSID
Object Name
Country or
Region ID
Object Name
Language ID
Reserved
Parent File ID
TRS
RMV
LST
Char(18)
Binary(4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
282
298
810
828
668
684
1196
1214
Char(16)
Char(512)
Char(18)
Binary(4)
830
1216
Binary(5)
834
1220
Char(2)
836
1222
Char(3)
839
842
858
874
1386
1225
1228
1244
1260
1772
Char(3)
Char(16)
Char(16)
Char(512)
Binary(4)
1388
1774
Char(1026)
2414
2430
2440
2445
2800
2816
2826
2831
Char(16)
Char(10)
Char(5)
Binary(5)
2449
2835
2451
2837
2454
2840
2456
2842
Object File ID
Object Name
Reserved
Object Name
length
Object Name
CCSID
Object Name
Country or
Region ID
Object Name
Language ID
Reserved
Parent File ID
Object File ID
Object Name
Certificate
Label Length
Certificate
Label1
Object File ID
ASP Name
ASP Number
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
Char(16)
Char(10)
Char(5)
Binary(5)
2457
2843
2473
2859
7475
7491
7501
7506
7861
7877
7887
7892
7510
7896
Relative File
ID2
Absolute Path
Name1
Object File ID
ASP Name
ASP Number
Path Name
CCSID
Path name
Country or
Region ID
Char(2)
543
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
7512
7898
Char(3)
7515
7901
Binary(4)
7517
7903
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(1)
|
|
|
|
|
|
|
7518
7904
7534
7920
Relative File
Char(16)
ID3
Absolute Path Char(5002)
Name1
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
When the path name indicator (offset 2456) is N, this field will contain the relative file ID of the absolute
path name at offset 2473. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
|
|
When the path name indicator (offset 7517) is N, this field will contain the relative file ID of the absolute
path name at offset 7534. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
The field will be blanks when it is not a key ring file operation.
|
|
| Table 169. LD (Link, Unlink, Search Directory) Journal Entries. QASYLDJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
Link directory
Unlink directory
Search directory
|
| 157
|
|
|
|
|
| 177
|
544
225
611
243
629
245
631
(Reserved
area)
(Reserved
area)
Object Name
Length 1
Object Name
CCSID1
Char(20)
Char(18)
Binary (4)
Binary(5)
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
181
249
635
Char(2)
183
251
637
Char(3)
186
254
640
189
257
643
205
273
659
221
289
801
817
827
832
675
1187
1203
1213
1218
836
1222
838
1224
841
1227
843
1229
Object Name
Country or
Region ID1
Object Name
Language ID1
(Reserved
area)
Parent File
ID1,2
Object File
ID1,2
Object Name1
Object File ID
ASP Name
ASP Number
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
|
|
|
|
|
|
|
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
844
1230
860
1246
Relative File
ID1
Absolute Path
Name2
|
|
When the path name indicator (offset 843) is N, this field will contain the relative file ID of the absolute
path name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
|
|
This is a variable length field. The first 2 bytes contain the length of the path name.
| Table 170. ML (Mail Actions) Journal Entries. QASYMLJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
225
611
|
| 157
Field
Format
Description
Entry Type
Char(1)
User Profile
Char(10)
O
Mail log opened
User profile name.
545
Offset
| JE
J4
J5
Field
Format
Description
| 167
| 175
|
235
243
621
629
User ID
Address
Char(8)
Char(8)
User identifier
User address
| Table 171. NA (Attribute Change) Journal Entries. QASYNAJE/J4/J5 Field Description File
|
Offset
JE
J4
J5
|
|
|
|
156
224
610
Field
Entry Type
Format
Description
Char(1)
|
| 157
| 167
|
| 417
|
|
225
235
611
621
485
871
Attribute
New Attribute
Value
Old Attribute
Value
Char(10)
Char(250)
Char(250)
T
Change to TCP/IP attribute.
The name of the attribute.
The value of the attribute after it was changed.
The value of the attribute before it was
changed.
| Table 172. ND (APPN Directory Search Filter) Journal Entries. QASYNDJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
157
225
611
165
233
619
173
241
627
181
249
635
189
257
643
197
265
651
205
273
659
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
546
Field
Format
Description
Entry Type
Char(1)
Filtered control
point name
Filtered control
point NETID.
Filtered CP
location name
Filtered CP
location
NETID
Partner
location name
Partner
location
NETID
Inbound
session
Char(8)
A
Directory search filter violation
Filtered control point name
Char(8)
Char(8)
Char(8)
Char(8)
Char(8)
Char(1)
Inbound session.
Y
Offset
| JE
J4
J5
Field
Format
Description
| 206
|
|
274
660
Outbound
session
Char(1)
Outbound session.
|
|
For more information about APPN Directory Search Filter and APPN End point,
see the Information Center (see Prerequisite and related information on page xvi
for details).
| Table 173. NE (APPN End Point Filter) Journal Entries. QASYNEJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
157
225
611
165
233
619
173
181
241
249
627
635
|
|
|
|
|
|
|
|
|
|
| 182
|
|
250
636
Field
Format
Description
Entry Type
Char(1)
Local location
name
Remote
location name
Remote NETID
Inbound
session
Char(8)
A
End point filter violation
Local location name.
Char(8)
Char(8)
Char(1)
Remote NETID.
Inbound session.
Outbound
session
Char(1)
|
|
N
This is not an inbound session
Outbound session.
Y
For more information about APPN Directory Search Filter and APPN End point,
see the Information Center (see Prerequisite and related information on page xvi
for details).
| Table 174. OM (Object Management Change) Journal Entries. QASYOMJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
|
|
| 157
|
M
225
611
Old Object
Name
Char(10)
R
Object renamed.
The old name of the object.
547
Offset
JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
167
235
621
Char(10)
177
185
245
253
631
639
Char(8)
Char(10)
195
263
649
Char(10)
205
273
659
225
235
293
303
679
689
247
315
701
255
323
709
318
386
772
330
398
784
338
406
792
401
469
855
Old Library
Name
Object Type
New Object
Name
New Library
Name
(Reserved
Area)
Office User
Old Folder or
Document
Name
(Reserved
Area)
Old Folder
Path
New Folder or
Document
Name
(Reserved
Area)
New Folder
Path
Office on
Behalf of User
(Reserved
Area)
(Reserved
Area)
Object Name
Length
Object Name
CCSID1
Object Name
Country or
Region ID1
Object Name
Language ID1
(Reserved area)
Old Parent File
ID1,2
Old Object File
ID1,2
Old Object
Name1
New Parent
File ID1,2
New Object
1, 2 ,6
Name
Object File
ID1,2
ASP Name7
411
479
865
497
883
431
499
885
435
503
889
437
505
891
440
443
508
511
894
897
459
527
913
475
543
929
987
1055
1441
1003
1071
1457
1583
1969
1599
1985
548
Char(20)
Char(10)
Char(12)
Char(8)
Char(63)
Char(12)
Char(8)
Char(63)
Char(10)
Char(20)
Char (18)
Binary (4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(512)
Char(16)
Char(10)
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1609
1614
1995
2000
Char(5)
Binary(5)
1618
2004
1620
2006
1623
2009
1625
2011
ASP Number7
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
Char(16)
Char(10)
Char(5)
Binary(5)
1626
2012
1642
2028
6644
6660
6670
6675
7030
7046
7056
7061
6679
7065
6681
7067
6684
7070
6686
7072
Relative File
ID3
Absolute Path
Name5
Object File ID
ASP Name8
ASP Number8
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
6687
7073
6703
7089
Relative File
ID4
Absolute Path
Name5
549
Offset
JE
These fields are used only for objects in the QOpenSys, "root" file systems, and user-defined file systems.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the path name indicator (offset 1625) is N, this field will contain the relative file ID of the absolute
path name at offset 1642. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
|
|
When the path name indicator (offset 6686) is N, this field will contain the relative file ID of the absolute
path name at offset 6703. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
There is no associated length field for this value. The string is null padded unless it is the full 512 characters
long.
|
|
If the old object is in a library, this is the ASP information of the objects library. If the old object is not in a
library, this is the ASP information of the object.
|
|
|
If the new object is in a library, this is the ASP information of the objects library. If the new object is not in a
library, this is the ASP information of the object.
J4
J5
Field
Format
Description
| Table 175. OR (Object Restore) Journal Entries. QASYORJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
|
|
|
|
| 157
|
| 167
|
| 177
| 185
|
| 195
|
| 205
|
|
E
225
611
235
621
245
253
631
639
263
649
273
659
Restored
Object Name
Restored
Library Name
Object Type.
Save Object
Name
Save Library
Name
Program State1
Char(10)
Char(10)
Char(8)
Char(10)
Char(10)
Char(1)
|
|
| 206
||
|
| 207
|
550
274
660
System
Command
(Reserved
Area)
Char(1)
2
Char(18)
Offset
| JE
J4
J5
Field
Format
Description
275
661
SETUID Mode
Char(1)
|
|
|
|
|
N
276
662
SETGID Mode
Char(1)
|
|
|
|
|
|
|
N
277
663
Signature
Status
Char(1)
|
|
Signature ignored
Unsignable object
Object unsigned
Signature is valid
|
|
| 225
| 235
|
| 247
|
| 255
|
| 318
|
| 330
|
| 338
|
| 401
|
| 411
|
|
|
|
|
| 431
|
| 435
|
|
| 437
|
278
293
303
664
679
689
315
701
323
709
386
772
398
784
406
792
469
855
479
865
497
883
499
885
503
889
505
891
Reserved
Office User
Restore DLO
Name
(Reserved
Area)
Restore Folder
Path
Save DLO
Name
(Reserved
Area)
Save Folder
Path
Office on
Behalf of User
(Reserved
Area)
(Reserved
Area)
Object Name
Length
Object Name
CCSID3
Object Name
Country or
Region ID3
Object Name
Language ID3
Char(15)
Char(10)
Char(12)
Char(8)
Char(63)
Char(12)
Char(8)
Char(63)
Char(10)
Char(20)
Char(18)
Binary (4)
Binary(5)
Char(2)
Char(3)
551
Offset
| JE
J4
J5
Field
Format
| 440
|
| 443
|
| 459
|
| 475
|
|
|
508
894
Char(3)
511
897
527
913
543
1055
1071
929
1441
1457
(Reserved
area)
Parent File
ID3,4
Object File
ID3,4
Object Name3
Old File ID
Media File ID
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Description
Char(16)
Char(16)
Char(512)
Char(16)
Char(16)
Note:
|
|
|
|
|
|
|
1087
1103
1113
1118
1473
1489
1499
1504
1122
1508
1124
1510
1127
1513
1129
1515
Object File ID
ASP Name7
ASP Number7
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
1130
1516
1146
1532
Relative File
ID5
Absolute Path
Name6
This field has an entry only if the object being restored is a program.
This field has an entry only if the object being restored is a command.
These fields are used only for objects in the QOpenSys file system and the "root" file system.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the path name indicator (offset 1129) is N, this field will contain the relative file ID of the absolute
path name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
552
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
157
167
177
185
195
205
225
235
245
253
263
273
611
621
631
639
649
659
225
235
247
293
303
315
679
689
701
255
318
323
386
709
772
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
328
396
782
414
800
348
416
802
352
420
806
354
422
808
357
360
425
428
811
814
376
444
830
392
460
972
988
998
1003
846
1358
1374
1384
1389
1007
1393
1009
1395
1012
1398
Field
Format
Description
Entry Type
Char(1)
Object Name
Library Name
Object Type
Old Owner
New Owner
(Reserved
Area)
Office User
DLO Name
(Reserved
Area)
Folder Path
Office on
Behalf of User
(Reserved
Area)
(Reserved
Area)
Object Name
Length
Object Name
CCSID1
Object Name
Country or
Region ID1
Object Name
Language ID1
(Reserved area)
Parent File
ID1,2
Object File
ID1,2
Object Name1
Object File ID
ASP Name5
ASP Number5
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Char(10)
Char(10)
Char(8)
Char(10)
Char(10)
Char(20)
A
Change of object owner
The name of the object.
The name of the library the object is in.
The type of object.
Old owner of the object.
New owner of the object.
Char(10)
Char(12)
Char(8)
Char(63)
Char(10)
Char(20)
Char(18)
Binary (4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
553
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
1014
1400
Path Name
Indicator
Char(1)
|
|
|
|
|
|
|
Char(16)
Char(5002)
1015
1401
1031
1417
Relative File
ID3
Absolute Path
Name4
These fields are used only for objects in the QOpenSys file system and the "root" file system.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the path name indicator (offset 1014) is N, this field will contain the relative file ID of the absolute
path name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
| Table 177. O1 (Optical Access) Journal Entries. QASY01JE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
|
224
610
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503, and
Table 143 on page 504 for field listing.
Entry Type
Char(1)
R-Read
U-Update
D-Delete
C-Create Dir
|
| 157
|
225
611
Object Type
Char(1)
|
| 158
|
226
612
Access Type
Char(1)
227
237
245
255
287
613
623
631
641
673
929
939
Device Name
CSI Name
CSI Library
Volume Name
Object Name
ASP name
ASP number
Char(10)
Char(8)
Char(10)
Char(32)
Char(256)
Char(10)
Char(5)
|
|
|
|
|
|
|
|
159
169
177
187
219
554
D-File Data
A-File Directory Attributes
Library LUD name
Side Object Name
Side Object Library
Optical volume name
Optical directory/file name
ASP name for CSI library
ASP number for CSI library
Offset
JE
|
|
|
|
|
|
|
J4
J5
Field
Format
Description
| Table 178. O2 (Optical Access) Journal Entries. QASY02JE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
|
224
610
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503,
and Table 143 on page 504 for field listing.
Entry Type
Char(1)
C-Copy
R-Rename
|
| 157
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
M-Move File
225
611
Object Type
Char(1)
158
226
612
Char(10)
D-Directory
Source library LUD name
168
176
236
244
622
630
Char(8)
Char(10)
186
254
640
Char(32)
218
474
286
542
672
928
Char(256)
Char(10)
484
492
552
560
938
946
Char(8)
Char(10)
502
570
956
Char(32)
534
602
988
1244
1254
1259
Src Device
Name
Src CSI Name
Src CSI
Library
Src Volume
Name
Src Obj Name
Tgt Device
Name
Tgt CSI Name
Tgt CSI
Library
Tgt Volume
Name
Tgt Obj Name
ASP name
ASP number
ASP name for
target CSI
library
ASP number
for target CSI
library
Char(256)
Char(10)
Char(5)
Char(10)
Char(5)
1269
F-File
555
Offset
| JE
J4
J5
| 1
|
|
| 156
|
224
610
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503,
and Table 143 on page 504 for field listing.
Entry Type
Char(1)
I-Initialize
N-Rename
B-Backup Volume
|
|
M-Import
E-Export
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
157
167
175
185
225
235
243
253
611
621
629
639
217
285
671
249
317
703
Device Name
CSI Name
CSI Library
Old Volume
Name
New Volume
Name 1
Old Auth List
Char(10)
Char(8)
Char(10)
Char(32)
R-Absolute Read
Library LUD name
Side Object Name
Side Object Library
Old Optical voulume name
Char(32)
Char(10)
Char(10)
Binary(5)
Binary(5)
Char(10)
Char(5)
Starting Block
Length read
ASP name for CSI library
ASP number for CSI library
259
327
713
269
273
337
341
723
727
731
741
New Auth
List 3
Address 4
Length 4
ASP name
ASP number
|
|
|
This field contains the new volume name for Initialize, Rename, and Convert functions; it contains the
backup bolume name for Backup functions. It contains volume name for Import, Export, Change
Authorization List, Change Volume Attributes, and Sector Read.
|
|
| Table 180. PA (Program Adopt) Journal Entries. QASYPAJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
556
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503, and
Table 143 on page 504 for field listing.
Offset
| JE
J4
J5
Field
Format
Description
| 156
224
610
Entry Type
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
157
167
225
235
611
621
177
185
245
253
263
281
631
639
649
667
283
669
287
673
289
675
292
295
311
327
839
678
681
697
713
1225
Program Name3
Program
Library3
Object Type
Owner
Reserved
Object Name
Length1
Object Name
CCSID1
Object Name
Country or
Region ID
Object Name
Language ID1
Reserved
Parent ID1, 2, 3
Object File ID 3
Object Name1
SETUID Mode
Char(10)
Char(10)
Char(8)
Char(10)
Char(18)
Binary (4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Char(16)
Char(512)
Char(1)
|
|
|
|
|
N
840
1226
SETGID Mode
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
N
841
1227
851
867
877
882
1237
1253
1263
1268
886
1272
888
1274
891
1277
Primary Group
Owner
Object File ID
ASP Name6
ASP Number6
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Char(10)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
557
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
893
1279
Path Name
Indicator
Char(1)
|
|
|
|
|
|
894
910
1280
1296
These fields are used only for objects in the QOpenSys and "root" file systems.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the entry type is J, the program name and the library name fields will contain *N. In addition, the
parent file ID and the object file ID fields will contain binary zeroes.
|
|
When the path name indicator (offset 893) is N, this field will contain the relative file ID of the absolute
path name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
| Table 181. PG (Primary Group Change) Journal Entries. QASYPGJE/J4/J5 Field Description File
|
Offset
JE
J4
J5
|
|
|
|
156
224
610
157
167
177
185
225
235
245
253
611
621
631
639
195
263
649
205
273
659
206
274
660
207
275
661
208
276
662
Object
Management
Object
Operational
Object Alter
209
277
663
210
278
664
|
|
|
|
|
|
|
|
|
|
|
|
||
|
||
|
|
|
||
|
Field
Format
Description
Entry Type
Char(1)
Object Name
Object Library
Object Type
Old Primary
Group
New Primary
Group
Char(10)
Char(10)
Char(8)
Char(10)
A
The
The
The
The
Char(10)
558
Char(1)
Char(1)
Char(1)
Object
Char(1)
Reference
(Reserved Area) Char(10)
*OBJEXIST
*OBJMGT
*OBJOPR
*OBJALTER
*OBJREF
Offset
| JE
J4
J5
Field
Format
|
||
|
|
|
|
|
|
||
|
||
|
||
|
|
||
|
||
|
220
288
674
Char(1)
221
289
675
Authorization
List
Management
Read Authority
222
290
676
Add Authority
Char(1)
223
291
677
Char(1)
224
292
678
225
293
679
226
236
294
304
680
690
237
305
691
Update
Authority
Delete
Authority
Execute
Authority
(Reserved Area)
Exclude
Authority
Revoke Old
Primary Group
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Char(1)
Char(1)
Char(1)
Char(10)
Char(1)
Char(1)
238
258
268
306
326
336
692
712
722
280
288
351
348
356
419
734
742
805
429
447
815
833
381
449
835
385
453
839
387
455
841
390
393
409
425
458
461
477
493
1005
1035
844
847
863
879
1391
1407
1417
1422
1040
1426
(Reserved Area)
Folder Path
Office on Behalf
of User
(Reserved Area)
(Reserved Area)
Object Name
Length1
Object Name
CCSID1
Object Name
Country or
Region ID1
Object Name
Language ID1
(Reserved area)
Parent File ID1,2
Object File ID1,2
Object Name1
Object File ID
ASP Name6
ASP Number6
Path Name
CCSID
Path Name
Country or
Region ID
361
Description
Y
*AUTLMGT
*READ
*ADD
*UPD
*DLT
*EXECUTE
*EXCLUDE
Char(8)
Char(63)
Char(10)
Char(20)
Char(18)
Binary (4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
559
Offset
JE
|
|
|
|
|
|
|
|
|
|
|
|
|
|
J4
J5
Field
Format
Description
1042
1428
Char(3)
1045
1431
Binary(4)
1047
1433
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(1)
1048
1064
1434
1450
These fields are used only for objects in the QOpenSys and "root" file systems.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the path name indicator (offset 1047) is N, this field will contain the relative file ID of the absolute
path name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
A value of *N implies the value of the Old Primary Group was not available.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
| Table 182. PO (Printer Output) Journal Entries. QASYPOJE/J4/J5 Field Description File
|
Offset
JE
`J4
J5
|
|
|
|
156
224
610
Field
Output Type
Format
Description
Char(1)
Direct print
|
| 157
||
|
225
611
Status After
Printing
Char(1)
|
|
|
|
|
|
|
|
|
158
168
178
184
194
204
560
226
236
246
252
262
272
612
622
632
638
648
658
Job Name
Job User Name
Job Number
User Profile
Output Queue
Output Queue
Library Name
Char(10)
Char(10)
Zoned(6,0)
Char(10)
Char(10)
Char(10)
' '
Direct print
The first part of the qualified job name.
The second part of the qualified job name.
The third part of the qualified job name.
The user profile that created the output.
The output queue containing the spooled file.1
The name of the library containing the output
queue.1
Offset
| JE
`J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
214
224
228
232
282
292
296
300
668
678
682
686
Char(10)
Char(4)
Char(4)
Char(10)
242
310
696
Char(10)
252
320
706
Char(10)
262
330
716
Char(4)
266
276
286
334
344
720
730
354
740
306
360
374
746
760
Device Name
Device Type
Device Model
Device File
Name
Device File
Library
Spooled File
Name
Short Spooled
File Number
Form Type
User Data
(Reserved area)
Spooled File
Number
Reserved Area
Remote System
561
629
1015
757
1143
765
1151
772
1158
1164
1174
Remote System
Print Queue
Spooled File
Job system
Name
Spooled File
Create Date
Spooled File
Create Time
ASP Name
ASP number
Char(10)
Char(10)
Char(20)
Char(6)
Char(14)
Char(255)
Char(128)
Char (8)
Char (7)
Char(6)
Char(10)
Char(5)
|
|
| Table 183. PS (Profile Swap) Journal Entries. QASYPSJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503, and
Table 143 on page 504 for field listing.
561
Offset
| JE
J4
J5
Field
Format
Description
| 156
224
610
Entry Type
Char(1)
|
|
|
|
|
|
|
| 157
| 167
|
| 175
|
| 185
|
| 195
|
| 205
|
| 215
|
|
225
235
611
621
243
629
253
639
263
649
273
659
283
669
User Profile
Source
Location
Original Target
User Profile
New Target
User Profile
Office User
Char(10)
Char(8)
V
User profile authenticated
User profile name.
Pass-through source location.
Char(10)
Char(10)
Char(10)
On Behalf of
User
Profile Token
Type
Char(10)
Char(1)
|
|
|
|
|
216
284
670
Profile Token
Timeout
Binary(4)
S
Single-use profile token
The number of seconds the profile token is valid.
Offset
Description
JE
J4
J5
|
|
|
562
Field
Format
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503, and
Table 143 on page 504 for field listing.
Offset
Description
JE
J4
J5
Field
|
|
|
156
224
610
Format
The type of violation
A
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Z
157
225
611
User Name
Char(10)
167
235
621
Device name
Char(40)
207
275
661
215
283
669
223
291
677
Remote
Char(8)
Location Name
Local Location Char(8)
Name
Network ID
Char(8)
| Table 185. RA (Authority Change for Restored Object) Journal Entries. QASYRAJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
|
|
|
|
|
|
|
|
||
|
||
|
||
|
|
|
Field
Entry Type
Format
Description
Char(1)
157
167
177
185
225
235
245
253
611
621
631
639
195
263
649
196
264
650
197
265
651
198
266
652
Object Name
Library Name
Object Type
Authorization
List Name
Public
Authority
Private
Authority
AUTL
Removed
Char(10)
Char(10)
Char(8)
Char(10)
(Reserved
Area)
Char(20)
Char(1)
Char(1)
Char(1)
The
The
The
The
563
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
218
230
286
298
672
684
Char(12)
Char(8)
238
306
692
DLO Name
(Reserved
Area)
Folder Path
Char(63)
(Reserved
Area)
(Reserved
Area)
Object Name
Length
Object Name
CCSID1
Object Name
Country or
Region ID1
Object Name
Language ID1
(Reserved
area)
Parent File
ID1,2
Object File
ID1,2
Object Name1
Object File ID
ASP Name5
ASP Number5
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(20)
301
369
755
387
773
321
389
775
325
393
779
327
395
781
330
398
784
333
401
787
349
417
803
365
433
945
961
971
976
819
1331
1347
1357
1362
980
1366
982
1368
985
1371
987
1373
|
|
|
|
|
|
|
Char(18)
Binary(4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
564
988
1374
1004
1390
Relative File
ID3
Absolute Path
Name4
Offset
| JE
J4
J5
Field
Format
Description
These fields are used only for objects in the QOpenSys and "root" file systems.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the path name indicator (offset 987) is N, this field will contain the relative file ID of the absolute
path name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
| Table 186. RJ (Restoring Job Description) Journal Entries. QASYRJJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
|
|
|
|
|
|
|
|
|
|
|
|
|
Field
Entry Type
Format
Description
Char(1)
157
225
611
167
235
621
177
185
245
253
631
639
Object Type
User Name
Char(8)
Char(10)
649
659
ASP name
ASP number
Char(10)
Char(5)
| Table 187. RO (Ownership Change for Restored Object) Journal Entries. QASYROJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
|
|
|
|
|
|
|
Field
Entry Type
Format
Description
Char(1)
A
157
167
177
185
225
235
245
253
611
621
631
639
Object Name
Library Name
Object Type
Old Owner
Char(10)
Char(10)
Char(8)
Char(10)
565
Offset
JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
195
263
649
New Owner
Char(10)
205
273
659
Char(20)
225
237
293
305
679
691
245
308
313
699
376
762
394
780
328
396
782
332
400
786
334
402
788
337
405
791
340
408
794
356
424
810
372
440
952
968
978
983
826
1338
1354
1364
1369
987
1373
989
1375
992
1378
994
1380
(Reserved
Area)
DLO Name
(Reserved
Area)
Folder Path
(Reserved
Area)
(Reserved
Area)
Object Name
Length1
Object Name
CCSID1
Object Name
Country or
Region ID1
Object Name
Language ID1
(Reserved
area)
Parent File
ID1,2
Object File
ID1,2
Object Name1
Object File ID
ASP Name5
ASP Number5
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
|
|
|
|
|
|
|
Char(12)
Char(8)
Char(63)
Char(20)
Char(18)
Binary(4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
566
995
1381
1011
1397
Relative File
ID3
Absolute Path
Name4
Offset
JE
These fields are used only for objects in the QOpenSys and "root" file systems.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the path name indicator (offset 994) is N, this field will contain the relative file ID of the absolute
path name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
J4
J5
Field
Format
Description
| Table 188. RP (Restoring Programs that Adopt Authority) Journal Entries. QASYRPJE/J4/J5 Field Description File
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Offset
JE
1
J4
1
J5
1
Field
Format
156
224
610
Entry Type
Char(1)
Description
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503, and
Table 143 on page 504 for field listing.
The type of entry.
Restoring programs that adopt the
owners authority
The name of the program
The name of the library in which the program is
located
The type of object
Name of the owner
A
157
167
225
235
611
621
177
185
245
253
263
281
631
639
649
667
283
669
287
673
289
675
292
295
311
327
839
855
865
870
678
681
697
713
1225
1241
1251
1256
874
1260
876
1262
Program Name
Program
Library
Object Type
Owner Name
(Reserved Area)
Object Name
Length1
Object Name
CCSID1
Object Name
Country or
Region ID1
Object name
Language ID1
(Reserved Area)
Parent File ID1,2
Object File ID1,2
Object Name1
Object File ID
ASP Name5
ASP Number5
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Char(10)
Char(10)
Char(8)
Char(10)
Char(18)
Binary (4)
Binary (5)
Char (2)
Char (3)
Char (3)
Char (16)
Char (16)
Char (512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
567
Offset
| JE
|
|
|
|
|
|
|
|
|
|
|
|
J4
879
J5
1265
881
1267
Field
Path Name
Length
Path Name
Indicator
Format
Binary(4)
Description
The length of the absolute path name.
Char(1)
882
898
1268
1284
These fields are used only for objects in the QOpenSys and the root file system.
If an ID that has the left-most bit set and the rest of the bits are zero, the ID is not set.
|
|
When the path name indicator (offset 994) is N, this field will contain the relative file ID of the absolute
path name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
| Table 189. RQ (Restoring Change Request Descriptor Object) Journal Entries. QASYRQJE/J4/J5 Field Description
| File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
|
|
| 157
| 167
|
| 177
|
|
|
Field
Entry Type
Format
Description
Char(1)
225
235
611
621
Object Name
Object Library
Char(10)
Char(10)
245
631
639
649
Object Type
ASP name
ASP number
Char(8)
Char(10)
Char(5)
| Table 190. RU (Restore Authority for User Profile) Journal Entries. QASYRUJE/J4/J5 Field Description File
|
Offset
JE
J4
J5
|
|
|
|
156
224
610
Field
Entry Type
Format
Description
Char(1)
568
Offset
| JE
J4
J5
Field
Format
Description
| 157
|
| 167
| 177
|
|
225
611
User Name
Char(10)
235
245
253
621
631
639
Library Name
Object Type
Authority
Restored
Char(10)
Char(8)
Char(1)
|
|
| Table 191. RZ (Primary Group Change for Restored Object) Journal Entries. QASYRZJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
157
167
225
235
177
185
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Field
Format
Description
Entry Type
Char(1)
611
621
Object Name
Object Library
Char(10)
Char(10)
245
253
631
639
Char(8)
Char(10)
195
263
649
Char(10)
205
273
659
225
237
293
305
679
691
245
308
313
699
376
762
394
780
328
396
782
332
400
786
334
402
788
337
405
791
340
408
794
Object Type
Old Primary
Group
New Primary
Group
(Reserved
Area)
DLO Name
(Reserved
Area)
Folder Path
(Reserved
Area)
(Reserved
Area)
Object Name
Length1
Object Name
CCSID1
Object Name
Country or
Region ID1
Object Name
Language ID1
(Reserved
area)
Parent File
ID1,2
A
Primary group changed.
The name of the object.
The name of the library where the object is
found.
The type of object.
The previous primary group for the object.
Char(20)
Char(12)
Char(8)
Char(63)
Char(20)
Char(18)
Binary(4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
569
Offset
JE
| 356
|
| 372
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
J4
J5
Field
Format
Description
424
810
Char(16)
440
952
968
978
983
826
1338
1354
1364
1369
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
987
1373
989
1375
992
1378
994
1380
Object File
ID1,2
Object Name1
Object File ID
ASP Name
ASP Number
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(2)
Char(3)
Binary(4)
Char(1)
Char(16)
Char(5002)
995
1381
1011
1397
Relative File
ID3
Absolute Path
Name4
These fields are used only for objects in the QOpenSys and "root" file systems.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the path name indicator (offset 1014) is N, this field will contain the relative file ID of the absolute
path name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
|
|
This is a variable length field. The first 2 bytes contain the length of the path name.
| Table 192. SD (Change System Distribution Directory) Journal Entries. QASYSDJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
570
Offset
| JE
J4
J5
Field
Format
| 157
||
|
225
611
Type of
Change
Char(3)
Description
ADD
CHG
COL
Collector entry
DSP
OUT
PRT
RMV
RNM
RTV
Retrieve details
SUP
Supplier entry
DIRE
Directory
DPTD
Department details
|
| 160
|
|
| 164
|
| 172
| 182
|
| 190
||
|
|
228
614
232
618
240
250
626
636
258
644
Type of record
Originating
System
User Profile
Requesting
system
Function
Requested
Char(4)
Char(8)
Char(10)
Char(8)
Char(6)
INIT
Initialization
OFFLIN
Offline initialization
|
|
REINIT
|
|
SHADOW
Normal shadowing
|
|
|
|
|
|
|
STPSHD
Stop shadowing
The user ID being changed
The address being changed
The network user ID being changed
Reinitialization
196
204
212
264
272
280
650
658
666
User ID
Address
Network User
ID
Char(8)
Char(8)
Char(47)
| Table 193. SE (Change of Subsystem Routing Entry) Journal Entries. QASYSEJE/J4/J5 Field Description File
|
Offset
JE
J4
J5
|
|
|
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503, and
Table 143 on page 504 for field listing.
571
Offset
JE
J4
J5
Field
Format
Description
156
224
610
Entry Type
Char(1)
157
225
611
Char(10)
A
Subsystem routing entry changed
The name of the object
167
177
185
235
245
253
621
631
639
Subsystem
Name
Library Name
Object Type
Program Name
195
205
263
273
649
659
Char(10)
Char(4)
209
277
663
Library Name
Sequence
Number
Command
Name
Char(3)
|
|
|
|
|
|
|
|
|
|
|
|
|
Char(10)
Char(8)
Char(10)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
666
676
681
691
ADD
ADDRTGE
CHG
CHGRTGE
Char(10)
RMV RMVRTGE
ASP name for SBSD library
Char(5)
Char(10)
Char(5)
| Table 194. SF (Action to Spooled File) Journal Entries. QASYSFJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Access Type
Format
Description
Char(1)
|
|
|
|
572
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
157
225
611
Char(10)
167
177
185
195
205
235
245
253
263
273
621
631
639
649
659
215
283
669
Database File
Name
Library Name
Object Type
Reserved area
Member Name
Spooled File
Name
Short Spooled
File Number
219
287
673
229
297
683
307
693
259
262
265
275
285
313
327
330
333
343
353
699
713
716
719
729
739
295
363
749
305
315
373
383
759
769
325
393
779
333
401
787
341
409
795
349
417
803
357
425
811
365
433
819
441
827
451
837
461
847
467
475
853
861
239
Output Queue
Name
Output Queue
Library
Reserved area
Spooled File
Number
Reserved Area
Old Copies
New Copies
Old Printer
New Printer
New Output
Queue
New Output
Queue Library
Old Form Type
New Form
Type
Old Restart
Page
New Restart
Page
Old Page
Range Start
New Page
Range Start
Old Page
Range End
New Page
Range End
Spooled File
Job Name
Spooled File
Job User
Spooled File
Job Number
Old Drawer
New Drawer
Char(10)
Char(8)
Char(10)
Char(10)
Char(10)
Char(10)
Char(20)
Char(6)
Char(14)
Char(3)
Char(3)
Char(10)
Char(10)
Char(10)
Char(10)
Char(10)
Char(10)
Char(8)
Char(8)
Char(8)
Char(8)
Char(8)
Char(8)
Char(10)
Char(10)
Char(6)
Char(8)
Char(8)
Char(4)
Char(10)
573
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
483
869
Char(10)
493
879
Char(10)
503
889
Char(10)
513
899
Char(10)
523
909
Char(10)
533
919
Char(10)
543
929
Char(10)
553
939
Char(10)
563
949
Char(10)
573
959
Char(10)
583
969
Char(10)
593
979
Char(10)
603
989
Char(10)
613
999
Char(10)
623
1009
Char(10)
633
1019
Char(10)
643
1029
Char(10)
653
1039
Old Page
Definition
Name
Old Page
Definition
Library
New Page
Definition
Name
New Page
Definition
Library
Old Form
Definition
Name
Old Form
Definition
library
Name of new
form definition
New Form
Definition
Library
Old User
Defined Option
1
Old User
Defined Option
2
Old User
Defined Option
3
Old User
Defined Option
4
New User
Defined Option
1
New User
Defined Option
2
New User
Defined Option
3
New User
Defined Option
4
Old User
Defined Object
Old User
Defined Object
Library
Char(10)
574
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
663
1049
Char(10)
673
1059
Char(10)
683
1069
Char(10)
693
1079
Char(10)
703
1089
Char(8)
711
1097
Char(7)
718
1104
Old User
Defined Object
Type
New User
Defined Object
New User
Defined Object
Library
New User
Defined Object
Type
Spooled File
Job System
Name
Spooled File
Create Date
Spooled File
Create Time
Name of old
user defined
data
Name of new
user defined
data
Char(6)
Char(255)
Char(255)
|
|
1110
1365
| Table 195. SG (Asychronous Signals) Journal Entries. QASYSGJ4/J5 Field Description File
|
Offset
| JE
J4
J5
|
|
|
|
224
610
Field
Entry Type
Format
Description
Char(1)
|
|
|
|
P
225
229
611
615
Signal exception
|
|
575
Offset
| JE
J4
J5
Field
Format
Description
230
616
Signal Source
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
P
Process source
Note: When the signal source value is machine,
the source job values are blank.
The first part of the source jobs qualified name.
231
617
241
627
251
637
257
643
267
653
Source Job
Name
Source Job
User Name
Source Job
Number
Source Job
Current User
Generation
Timestamp
Char(10)
Char(10)
Char(6)
Char(10)
Char(8)
Machine source
| Table 196. SK (Secure Sockets Connections) Journal Entries. QASYSKJ4/J5 Field Description File
|
Offset
| JE
J4
J5
|
|
|
|
|
224
610
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501 and Table 142 on page 503
for field listing.
Entry type
Char(1)
Accept
Connect
Filtered mail
Port unavailable
Reject mail
|
|
|
|
|
|
|
|
|
|
|
|
|
|
576
225
611
240
245
626
631
260
265
646
651
269
655
279
665
281
667
Local IP
Address
Local port
Remote IP
Address
Remote port
Socket
Descriptor
Filter
Description
Filter Data
Length
Filter Data1
Char(15)
U
DHCP address denied
The local IP address.
Char(5)
Char(15)
Char(5)
Bin(5)
Char(10)
Bin(4)
Char(514)
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
795
1181
Address
Family
Char(10)
Local IP
address
Remote IP
address 2
MAC address
Host name
Char(46)
Char(46)
Char(32)
Char(255)
|
|
|
|
|
|
|
805
1191
851
1237
897
929
1283
1315
*IPV4
This is a variable length field. The first two bytes contain the length of the field.
|
|
When the entry type is D, this field contains the IP address the DHCP server assigned the requesting client.
| Table 197. SM (System Management Change) Journal Entries. QASYSMJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
DRDA
Add
Change
Delete
Remove
Display
|
| 157
|
|
| 158
|
| 162
| 169
|
|
225
611
226
612
230
237
616
623
Access Type
Sequence
Number
Message ID
Relational
Database
Name
Char(1)
Char(4)
T
Retrieve or receive
Sequence number of the action
Char(7)
Char(18)
577
Offset
JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
187
255
641
Char(10)
197
265
651
Char(10)
207
275
661
Char(10)
217
285
671
Char(10)
227
295
681
Char(10)
237
305
691
Zoned(6,0)
243
311
697
Char(10)
253
321
707
261
329
715
File System
Name
Backup Option
Changed
Backup List
Change
Network File
Name
Network File
Member
Network File
Number
Network File
Owner
Network File
Originating
User
Network File
Originating
Address
Char(8)
Char(8)
| Table 198. SO (Server Security User Information Actions) Journal Entries. QASYSOJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
Add entry
Change entry
|
| 157
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
578
225
235
611
621
236
622
237
437
623
823
440
826
442
828
462
848
User Profile
Char(10)
Server
Char(1)
Authentication
Entry
Password
Char(1)
Stored
Server Name
(Reserved
Area)
User ID
Length
(Reserved
Area)
User ID
Char(200)
Char(3)
Binary (4)
R
Remove entry
The name of the user profile.
Y = Entry is a server authentication entry.
No change
Y
Password is stored.
The name of the server.
Char(20)
Char(1002)1
This is a variable length field. The first 2 bytes contain the length of the field.
OS/400 Security Reference V5R2
Offset
JE
J4
J5
|
|
|
|
156
224
610
157
225
611
|
|
Field
Format
Description
Entry Type
Char(1)
Service Tool
Char(2)
A
Service record
The type of entry.
CS
STRCPYSCN
CD
QTACTLDV
CE
QWTCTLTR
CT
DMPCLUTRC
DC
DLTCMNTRC
DD
DMPDLO
DO
DMPOBJ
DS
DMPSYSOBJ, QTADMPTS
EC
ENDCMNTRC
ER
ENDRMTSPT
HD
QYHCHCOP (DASD)
HL
QYHCHCOP (LPAR)
PC
PRTCMNTRC
PE
PRTERRLOG
PI
PRTINTDTA
SE
QWTSETTR
SC
STRCMNTRC
SJ
STRSRVJOB
SR
STRRMTSPT
ST
STRSST
TA
TRCTCPAPP
TC
TE
ENDTRC, ENDPEX
|
|
TI
|
|
|
|
|
|
|
|
159
169
179
187
197
207
213
227
237
247
255
265
275
281
613
623
633
641
651
661
667
Object Name
Library Name
Object Type
Job Name
Job User Name
Job Number
Object Name
Char(10)
Char(10)
Char(8)
Char(10)
Char(10)
Zoned(6,0)
Char(30)
TS
STRTRC, STRPEX
Name of the object accessed
Name of the library for the object
Type of object
The first part of the qualified job name
The second part of the qualified job name
The third part of the qualified job name
Name of the object for DMPSYSOBJ
Appendix F. Layout of Audit Journal Entries
579
Offset
JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
|
|
243
311
697
Library Name
Char(30)
273
281
293
341
349
361
727
735
747
Char(8)
Char(12)
Char(8)
301
369
755
Object Type
DLO Name
(Reserved
Area)
Folder Path
432
442
818
828
JUID Field
Early Trace
Action1
Char(10)
Char(10)
Char(63)
*OFF
|
|
|
|
|
|
*RESET
452
838
Application
Trace Option2
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
453
839
463
849
859
867
877
887
892
902
Application
Traced2
Service Tools
Profile3
Source node
ID
Source user
ASP name for
object library
ASP number
for object
library
ASP name for
DMPSYSOBJ
object library
ASP number
for
DMPSYSOBJ
object library
Char(10)
Char(10)
Char(8)
Char(10)
Char(10)
Source user
ASP name for object library
Char(5)
Char(10)
Char(5)
This field is used only when the entry type (offset 225) is CE.
This field is used only when the entry type (offset 225) is TA.
|
|
This field is used only when the entry type (offset 225) is ST.
580
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
157
225
611
Char(10)
621
System Value
or Service
Attribute
New Value
167
235
417
485
871
Old Value
Char(250)
667
735
1121
Char(250)
917
985
1371
New Value
Continued
Old Value
Continued
Char(250)
Char(250)
C
Change to system clock
The name of the system value or service attribute
| Table 201. VA (Change of Access Control List) Journal Entries. QASYVAJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Status
Format
Description
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
S
157
225
611
Server Name
Char(10)
167
235
621
Server Date
Char(6)
173
241
627
Server Time
Zoned(6,0)
179
247
633
Char(8)
187
255
641
197
265
651
Computer
Name
Requester
Name
Action
Performed
Char(10)
Char(1)
Successful
F
Failed
The name of the network server description that
registered the event.
The date the event was logged on the network
server.
The time the event was logged on the network
server.
The name of the computer issuing the request to
change the access control list.
The name of the user issuing the request.
The action performed on the access control
profile:
Addition
Modification
|
|
|
|
198
266
652
Resource
Name
Char(260)
D
Deletion
The name of the resource to be changed.
581
Offset
JE
J4
J5
|
|
|
|
|
|
156
224
610
Field
Connect
Action.
Format
Description
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
157
225
611
Server Name
Char(10)
167
235
621
Server Date
Char(6)
173
241
627
Server Time
Zoned(6,0)
179
247
633
Char(8)
187
255
641
197
202
265
270
651
656
Computer
Name
Connection
User
Connect ID
Rejection
Reason
Char(10)
Char(5)
Char(1)
Start
End
R
Reject
The name of the network server description that
registered the event.
The date the event was logged on the network
server.
The time the event was logged on the network
server.
The name of the computer associated with the
connection request.
The name of the user associated with the
connection request.
The start or stop connection ID.
The reason the connection was rejected:
A
|
|
|
|
|
|
|
|
203
271
657
Network
Name
Char(12)
P
No access permission to shared resource
The network name associated with the
connection.
| Table 203. VF (Close of Server Files) Journal Entries. QASYVFJE/J4/J5 Field Description File
|
Offset
JE
J4
J5
|
|
|
|
156
224
610
Field
Close Reason
Format
Description
Char(1)
Administrative disconnection
|
|
|
|
|
|
|
157
225
611
Server Name
Char(10)
167
235
621
Server Date
Char(6)
173
241
627
Server Time
Zoned(6,0)
582
S
Session disconnection
The name of the network server description that
registered the event.
The date the event was logged on the network
server.
The time the event was logged on the network
server.
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
179
247
633
Char(8)
187
255
641
Char(10)
197
202
208
265
270
276
651
656
662
Computer
Name
Connection
User
File ID
Duration
Resource
Name
Char(5)
Char(6)
Char(260)
| Table 204. VL (Account Limit Exceeded) Journal Entries. QASYVLJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Reason
Format
Description
Char(1)
Account expired
Account disabled
Unknown or unavailable
|
|
|
|
|
|
|
|
|
|
|
|
|
157
225
611
Server Name
Char(10)
167
235
621
Server Date
Char(6)
173
241
627
Server Time
Zoned(6,0)
179
247
633
Char(8)
187
255
641
Computer
Name
User
197
265
651
Char(10)
W
Workstation not valid
The name of the network server description that
registered the event.
The date the event was logged on the network
server.
The time the event was logged on the network
server.
The name of the computer with the account limit
violation.
The name of the user with the account limit
violation.
The name of the resource being used.
| Table 205. VN (Network Log On and Off) Journal Entries. QASYVNJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Log Type
Format
Description
Char(1)
Logoff requested
Logon requested
Logon rejected
583
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
|
|
|
|
|
|
|
157
225
611
Server Name
Char(10)
167
235
621
Server Date
Char(6)
173
241
627
Server Time
Zoned(6,0)
179
247
633
Char(8)
187
197
255
265
641
651
Computer
Name
User
User Privilege
Char(10)
Char(1)
Administrator
Guest
|
| 198
266
652
Reject Reason
Char(1)
U
User
The reason the log on attempt was rejected:
Access denied
|
| 199
|
|
267
653
Additional
Reason
Char(1)
P
Incorrect password
Details of why access was denied:
A
Account expired
Account disabled
|
|
Unknown or unavailable
| Table 206. VO (Validation List) Journal Entries. QASYVOJ4/J5 Field Description File
|
Offset
| JE
J4
J5
|
|
|
|
224
610
Field
Entry Type
Format
Description
Char(1)
|
|
584
Offset
| JE
J4
J5
Field
Format
Description
|
|
|
225
611
Unsuccessful
Type
Char(1)
|
|
|
|
|
|
|
|
|
|
|
226
236
246
612
622
632
Validation List
Library Name
Encrypted
Data
Char(10)
Char(10)
Char(1)
V
Validation list was not found
The name of the validation list.
The name of the library the validation list is in.
Data value to be encrypted.
Y
N
247
633
Entry Data
Char(1)
|
|
|
|
|
|
|
|
|
N
248
634
250
252
636
638
Entry ID
Length
Data length
Encrypted
Data Attribute
Binary(4)
Binary(4)
Char (1)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
253
639
254
640
282
382
668
768
1768
1778
X.509
Certificate
attribute
(Reserved
Area)
Entry ID
Entry Data
ASP name for
validation list
library
ASP number
for validation
list library
Char (1)
Char (28)
Byte(100)
Byte(1000)
Char(10)
Char(5)
585
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
157
225
167
|
|
|
|
|
|
|
|
|
|
|
Field
Format
Description
Error Type
Char(1)
611
Server Name
Char(10)
235
621
Server Date
Char(6)
173
241
627
Server Time
Zoned(6,0)
179
247
633
Char(8)
187
255
641
Computer
Name
User
P
Password error
The name of the network server description that
registered the event.
The date the event was logged on the network
server.
The time the event was logged on the network
server.
The name of the computer initiating the request.
Char(10)
| Table 208. VR (Network Resource Access) Journal Entries. QASYVRJE/J4/J5 Field Description File
|
Offset
JE
J4
J5
|
|
|
|
156
224
610
Field
Status
Format
Description
Char(1)
|
| 157
|
| 167
|
| 173
|
| 179
|
| 187
| 197
225
611
Server Name
Char(10)
235
621
Server Date
Char(6)
241
627
Server Time
Zoned(6,0)
247
633
Char(8)
255
265
641
651
Computer
Name
User
Operation Type
Char(10)
Char(1)
S
Resource access succeeded
The name of the network server description that
registered the event.
The date the event was logged on the network
server.
The time the event was logged on the network
server.
The name of the computer requesting the
resource.
The name of the user requesting the resource.
The type of operation being performed:
Resource deleted
|
| 198
|
| 202
| 206
586
266
652
Return Code
Char(4)
270
274
656
660
Server Message
File ID
Char(4)
Char(5)
X
Resource was run
The return code received if resource access is
granted.
The message code sent when access is granted.
The ID of the file being accessed.
Offset
JE
J4
J5
Field
Format
Description
|
|
211
279
665
Resource Name
Char(260)
| Table 209. VS (Server Session) Journal Entries. QASYVSJE/J4/J5 field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Session Action
Format
Description
Char(1)
|
|
|
|
|
|
|
|
|
|
|
|
End session
157
225
611
Server Name
Char(10)
167
235
621
Server Date
Char(6)
173
241
627
Server Time
Zoned(6,0)
179
247
633
Char(8)
187
197
255
265
641
651
Computer
Name
User
User Privilege
S
Start session
The name of the network server description that
registered the event.
The date the event was logged on the network
server.
The time the event was logged on the network
server.
The name of the computer requesting the session.
Char(10)
Char(1)
Administrator
Guest
|
| 198
266
652
Reason Code
Char(1)
U
User
The reason code for ending the session.
Administrator disconnect
|
|
|
|
|
|
|
Account restriction
| Table 210. VU (Network Profile Change) Journal Entries. QASYVUJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503, and
Table 143 on page 504 for field listing.
587
Offset
| JE
J4
J5
Field
Format
Description
| 156
224
610
Type
Char(1)
Group record
User record
|
|
|
|
|
|
|
|
|
|
|
|
157
225
611
Server Name
Char(10)
167
235
621
Server Date
Char(6)
173
241
627
Server Time
Zoned(6,0)
179
247
633
Char(8)
187
255
641
Computer
Name
User
197
265
651
Action
Char(1)
Char(10)
M
User profile global information
The name of the network server description that
registered the event.
The date the event was logged on the network
server.
The time the event was logged on the network
server.
The name of the computer requesting the user
profile change.
The name of the user requesting the user profile
change.
Action requested:
Addition
Change
Deletion
|
| 198
|
266
652
Resource Name
Char(260)
P
Incorrect password
Name of the resource.
| Table 211. VV (Service Status Change) Journal Entries. QASYVVJE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
Field
Entry Type
Format
Description
Char(1)
Server stopped
Server paused
Server restarted
|
|
|
|
|
|
|
|
|
|
157
225
611
Server Name
Char(10)
167
235
621
Server Date
Char(6)
173
241
627
Server Time
Zoned(6,0)
179
247
633
Char(8)
187
255
641
Computer
Name
User
S
Server started
The name of the network server description that
registered the event.
The date the event was logged on the network
server.
The time the event was logged on the network
server.
The name of the computer requesting the change.
Char(10)
588
Offset
| JE
J4
J5
Field
Format
Description
| 197
265
651
Status
Char(1)
Service active
Service pausing
Service paused
|
|
|
|
|
|
198
206
286
290
266
274
354
358
652
660
740
744
Service Code
Text Set
Return Value
Service
Char(8)
Char(80)
Char(4)
Char(20)
S
The
The
The
The
Service stopped
code of the service requested.
text being set by the service request.
return value from the change operation.
service that was changed.
| Table 212. X0 (Network Authentication) Journal Entries. QASYX0JE/J4/J5 Field Description File
|
Offset
| JE
J4
J5
| 1
|
|
Field
Format
Description
Heading fields common to all entry types. See
Table 141 on page 501,Table 142 on page 503, and
Table 143 on page 504 for field listing.
589
Offset
JE
J4
J5
Field
Format
Description
156
224
610
Entry Type
Char(1)
|
|
Decrypt of KRB_AP_PRIV or
KRB_AP_SAFE checksum error
|
|
KRB_AP_PRIV or KRB_AP_SAFE
timestamp error
|
|
|
|
KRB_AP_PRIV or KRB_AP_SAFE
sequence order error
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
590
225
233
611
619
241
627
262
648
283
669
Status Code
GSS Status
Value
Remote IP
Address
Local IP
Address
Encrypted
Addresses
Char(8)
Char(8)
Char(21)
Remote IP address
Char(21)
Local IP address
Char(256)
Encrypted IP addresses
Offset
JE
J4
J5
Field
Format
Description
539
925
Encrypted
Addresses
Indicator
Char(1)
540
548
926
934
556
942
564
572
950
958
580
966
588
974
596
982
600
986
602
988
Ticket flags
Ticket
Authentication
Time
Ticket Start
Time
Ticket End Time
Ticket Renew
Time
Message Time
Stamp
GSS Expiration
Time Stamp
Server Principal
CCSID
Server Principal
Length
Server Principal
Indicator
|
|
|
|
|
|
|
|
|
|
603
1115
989
1501
1119
1505
1121
1507
1122
1508
1634
2020
1638
2024
1640
2026
Server Principal
Server Principal
Parameter
CCSID
Server Principal
Parameter
Length
Server Principal
Parameter
Indicator
Server Principal
Parameter
Client Principal
CCSID
Client Principal
Length
Client Principal
Indicator
1641
2027
Client Principal
X
not provided
Ticket flags
Ticket authentication time
Char(8)
Char(8)
Char(8)
Char(8)
Char(8)
Binary(5)
Binary(4)
Char(1)
Char(512)
Binary(5)
X
not provided
Server principal (from ticket)
Server principal (from ticket) parameter CCSID
Binary(4)
Char(1)
Char(512)
X
not provided
Server principal parameter that ticket must match
Binary(5)
Binary(4)
Char(1)
|
|
|
Char(8)
Char(8)
|
|
|
|
|
|
|
|
|
|
|
||
|
Char(512)
X
not provided
Client principal from authenticator
591
Offset
JE
|
|
|
|
|
|
|
J4
J5
Field
Format
Description
2153
2539
Binary(5)
2157
2543
Binary(4)
2159
2545
Client Principal
CCSID
Client Principal
Length
Client Principal
Indicator
Char(1)
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
||
|
|
|
|
|
2160
2672
2546
3058
2676
3062
2678
3064
2679
3065
3191
3577
3195
3581
3197
3583
3198
3584
3710
4096
3714
4100
3716
4102
3717
592
4103
Client Principal
GSS Server
Principal CCSID
GSS Server
Principal
Length
GSS Server
Principal
Indicator
GSS Server
Principal
GSS Local
Principal CCSID
GSS Local
Principal
Length
GSS Local
Principal
Indicator
GSS Local
Principal
GSS Remote
Principal CCSID
GSS Remote
Principal
Length
GSS Remote
Principal
Indicator
GSS Remote
Principal
Char(512)
Binary(5)
X
not provided
Client principal from ticket
Server principal (from GSS credential) CCSID
Binary(4)
Char(1)
Char(512)
X
not provided
Server principal from GSS credential
Binary(5)
Binary(4)
Char(1)
Char(512)
X
not provided
GSS local principal
Binary(5)
Binary(4)
Char(1)
Char(512)
X
not provided
GSS remote principal
Offset
JE
J4
J5
|
|
|
|
156
224
610
157
167
177
185
195
225
235
245
253
263
611
621
631
639
649
207
275
661
215
283
669
278
346
732
288
356
742
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Field
Format
Description
Entry Type
Char(1)
Object Name
Library Name
Object Type
Office User
Folder or
Document
Name
(Reserved
Area)
Folder Path
Char(10)
Char(10)
Char(8)
Char(10)
Char(12)
C
Change of a DLO object
Name of the object
Name of the library
Type of object
User profile of the office user
Name of the document or folder
On Behalf of
User
Access Type
Char(10)
Packed(5,0)
Type of access
Char(8)
Char(63)
See Table 218 on page 597 for a list of the codes for access types.
| Table 214. YR (Read of DLO Object) Journal Entries. QASYYRJE/J4/J5 Field Description File
|
Offstes
| JE
J4
J5
| 1
|
|
| 156
224
610
157
167
177
185
195
225
235
245
253
263
611
621
631
639
649
207
215
278
275
283
346
661
669
732
288
356
742
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Field
Format
Description
Entry Type
Char(1)
Object Name
Library Name
Object Type
Office User
Folder or
Document
Name
(Reserved Area)
Folder Path
On Behalf of
User
Access Type
Char(10)
Char(10)
Char(8)
Char(10)
Char(12)
R
Read of a DLO object
Name of the object
Name of the library
Type of object
User profile of the office user
Name of the document library object
Char(8)
Char(63)
Char(10)
Packed(5,0)
Type of access
See Table 218 on page 597 for a list of the codes for access types.
593
Offset
| JE
J4
J5
| 1
|
|
| 156
224
610
157
167
225
235
177
185
188
245
253
256
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Format
Description
Entry Type
Char(1)
611
621
Object Name
Library Name
Char(10)
Char(10)
631
639
642
Object Type
Access Type
Access Specific
Data
(Reserved
Area)
(Reserved
Area)
Object Name
Length 2
Object Name
CCSID2
Object Name
Country or
Region ID2
Object Name
Language ID2
(Reserved
area)
Parent File ID2,
Char(8)
Packed(5,0)
Char(50)
238
306
692
324
710
258
326
712
262
330
716
264
332
718
267
335
721
270
338
724
Field
C
Change of an object
Name of the object
Name of the library in which the object is
located
Type of object
Type of access 1
Specific data about the access
Char(20)
Char(18)
Binary (4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
286
354
740
302
370
882
898
908
913
756
1268
1284
1294
1299
917
1303
919
1305
922
1308
924
1310
|
|
|
594
Object Name2
Object File ID
ASP Name6
ASP Number6
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
Char(1)
Offset
JE
|
|
|
|
J4
J5
Field
Format
Description
925
1311
Char(16)
941
1327
Relative File
ID4
Absolute Path
Name5
Char(5002)
See Table 218 on page 597 for a list of the codes for access types.
These fields are used only for objects in the QOpenSys, "root" file systems, and user-defined file systems.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
|
|
When the path name indicator (offset 924) is N, this field will contain the relative file ID of the absolute
path name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
|
|
|
If the object is in a library, this is the ASP information of the objects library. If the object is not in a library,
this is the ASP information of the object.
| Table 216. ZM (SOM Method Access) Journal Entries. QASYZMJE/J4/J5 Field Description File
|
Offset
| JE
J4
| 1
|
|
| 156
| 157
|
| 158
|
| 159
|
| 160
| 161
|
| 162
| 172
|
| 173
| 174
| 175
| 176
| 177
| 178
| 188
| 204
| 220
|
224
225
226
227
228
229
230
240
241
242
243
244
245
246
256
272
288
J5
Field
Access Type
Object
Existence
Object
Management
Object
Operational
Object Alter
Object
Reference
Reserved
List
Management
Read
Add
Update
Delete
Execute
Reserved
Class File ID
Object FIle ID
Method Name
Format
Description
Char(1)
Char(1)
Char(1)
Y Object management
Char(1)
Y Object operational
Char(1)
Char(1)
Y Object alter
Y Object reference
Char(10)
Char(1)
Reserved field
Y Authorization list management
Char(1)
Char(1)
Char(1)
Char(1)
Char(1)
Char(10)
Char(16)
Char(16)
Char(4096)
Y Read
Y Add
Y Update
Y Delete
Y Execute
Reserved field
File ID of class
File ID of object
Name of Method
595
J4
J5
156
224
610
157
167
177
185
188
225
235
245
253
256
611
621
631
639
642
306
324
692
710
258
326
712
262
330
716
264
332
718
267
270
286
302
335
338
354
370
882
898
908
913
721
724
740
756
1268
1284
1294
1299
917
1303
919
1305
922
1308
924
1310
238
Field
Format
Description
Entry Type
Char(1)
Object Name
Library Name
Object Type
Access Type
Access Specific
Data
(Reserved Area)
(Reserved Area)
Object Name
Length 2
Object Name
CCSID2
Object Name
Country or
Region ID2
Object Name
Language ID2
(Reserved area)
Parent File ID2,3
Object File ID2,3
Object Name2
Object File ID
ASP Name
ASP Number
Path Name
CCSID
Path Name
Country or
Region ID
Path Name
Language ID
Path Name
Length
Path Name
Indicator
Char(10)
Char(10)
Char(8)
Packed(5,0)
Char(50)
R
Read of an object
Name of the object
Name of the library in which the object is located
Type of object
Type of access 1
Specific data about the access
Char(20)
Char(18)
Binary(4)
Binary(5)
Char(2)
Char(3)
Char(3)
Char(16)
Char(16)
Char(512)
Char(16)
Char(10)
Char(5)
Binary(5)
Char(2)
Char(3)
Binary(4)
Char(1)
925
941
596
1311
1327
J4
J5
Field
Format
Description
See Table 218 for a list of the codes for access types.
These fields are used only for objects in the QOpenSys, "root" file systems, and user-defined file systems.
An ID that has the left-most bit set and the rest of the bits zero indicates that the ID is NOT set.
When the path name indicator (offset 924) is N, this field will contain the relative file ID of the absolute
path name. When the path name indicator is Y, this field will contain 16 bytes of hex zeroes.
This is a variable length field. The first 2 bytes contain the length of the path name.
Table 218 lists the access codes used for object auditing journal entries in files
QASYYCJE, QASYYRJE, QASYZCJE, and QASYZRJE.
Table 218. Numeric Codes for Access Types
Code
Access Type
Code
Access Type
Code
Access Type
Add
24
Hold
47
2
3
4
5
6
7
8
9
10
11
12
Activate Program
Analyze
Apply
Call or TFRCTL
Configure
Change
Check
Close
Clear
Compare
Cancel
25
26
27
28
29
30
31
32
33
34
35
Initialize
Load
List
Move
Merge
Open
Print
Query
Reclaim
Receive
Read
48
49
50
51
52
53
54
55
56
57
58
13
Copy
36
Reorganize
59
14
Create
37
Release
60
15
Convert
38
Remove
61
16
17
Debug
Delete
39
40
Rename
Replace
62
63
18
Dump
41
Resume
64
19
20
Display
Edit
42
43
Restore
Retrieve
65
66
21
22
End
File
44
45
Run
Revoke
67
68
23
Grant
46
Save
69
597
598
Security Tools
Table 219 describes these menu options and the associated commands:
Table 219. Tool Commands for User Profiles
Menu1 Option
Command Name
Description
ANZDFTPWD
QASECPWD2
DSPACTPRFL
QASECIDL2
599
Command Name
Description
CHGACTPRFL
QASECIDL2
Use the Change Active Profile List command
to add and remove user profiles from the
exemption list for the ANZPRFACT command.
A user profile that is on the active profile list
is permanently active (until you remove the
profile from the list). The ANZPRFACT
command does not disable a profile that is on
the active profile list, no matter how long the
profile has been inactive.
ANZPRFACT
QASECIDL2
DSPACTSCD
QASECACT2
CHGACTSCDE
QASECACT2
DSPEXPSCDE
CHGEXPSCDE
QASECEXP2
Use the Change Expiration Schedule Entry
command to schedule a user profile for
removal. You can remove it temporarily (by
disabling it) or you can delete it from the
system. This command uses a job schedule
entry that runs every day at 00:01 (1 minute
after midnight). The job looks at the
QASECEXP file to determine whether any user
profiles are set up to expire on that day.
Use the DSPEXPSCD command to display the
user profiles that are scheduled to expire.
PRTPRFINT
Notes:
1. Options are from the SECTOOLS menu.
2. This file is in the QUSRSYS library.
600
You can page down on the menu to see additional options. Table 220 describes the
menu options and associated commands for security auditing:
Table 220. Tool Commands for Security Auditing
Menu1 Option
Command Name
Description
10
CHGSECAUD
DSPSECAUD
Notes:
1. Options are from the SECTOOLS menu.
System:
When you select an option from this menu, you see the Submit Job (SBMJOB)
display, such as the following:
Appendix G. Commands and Menus for Security Commands
601
Job name . . . . . . . . .
Job description . . . . .
Library . . . . . . . .
Job queue . . . . . . . .
Library . . . . . . . .
Job priority (on JOBQ) . .
Output priority (on OUTQ)
Print device . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
*JOBD
*USRPRF
*JOBD
*JOBD
*JOBD
*CURRENT
...
Name, *JOBD
Name, *USRPRF
Name, *LIBL, *CURLIB
Name, *JOBD
Name, *LIBL, *CURLIB
1-9, *JOBD
1-9, *JOBD
Name, *CURRENT, *USRPRF...
If you want to change the default options for the command, you can press F4
(Prompt) on the Command to run line.
To see the Schedule Batch Reports, page down on the SECBATCH menu. By using
the options on this part of the menu, you can, for example, set up your system to
run changed versions of reports regularly.
SECBATCH
System:
User objects
User profile information
User profile internals
Check object integrity
You can page down for additional menu options. When you select an option from
this part of the menu, you see the Add Job Schedule Entry (ADDJOBSCDE)
display:
Add Job Schedule Entry (ADDJOBSCDE)
Type choices, press Enter.
Job name . . . . . . . . . . . .
Name, *JOBD
Command to run . . . . . . . . . > PRTADPOBJ USRPRF(*ALL)
Frequency . . . .
Schedule date, or
Schedule day . . .
+ for more values
Schedule time . .
. . . . . . .
. . . . . . .
. . . . . . .
...
*ONCE, *WEEKLY, *MONTHLY
*CURRENT
Date, *CURRENT, *MONTHST
*NONE
*NONE, *ALL, *MON, *TUE.
. . . . . . .
*CURRENT
Time, *CURRENT
You can position your cursor on the Command to run line and press F4 (Prompt) to
choose different settings for the report. You should assign a meaningful job name
so that you can recognize the entry when you display the job schedule entries.
602
Command Name
Description
1, 40
PRTADPOBJ
QSECADPOLD2
Use the Print Adopting Objects command to
print a list of objects that adopt the authority of
the specified user profile. You can specify a single
profile, a generic profile name (such as all
profiles that begin with Q), or all user profiles on
the system.
DSPAUDJRNE
QASYxxJE3
603
Command Name
Description
3, 42
PRTPVTAUT *AUTL
QSECATLOLD2
When you use the Print Private Authorities
command for *AUTL objects, you receive a list of
all the authorization lists on the system. The
report includes the users who are authorized to
each list and what authority the users have to the
list. Use this information to help you analyze
sources of object authority on your system.
PRTCMNSEC
QSECCMNOLD2
PRTJOBDAUT
604
QSECJBDOLD2
Command Name
Description
See note 4
PRTPUBAUT
QPBxxxxxx5
PRTPVTAUT
QPVxxxxxx5
PRTQAUT
605
Command Name
Description
25, 64
PRTSBSDAUT
PRTSYSSECA
27, 66
PRTTRGPGM
QSECTRGOLD2
Use the Print Trigger Programs command to
print a list of trigger programs that are associated
with database files on your system.
This report has two versions. The full report lists
every trigger program that is assigned and meets
your selection criteria. The changed report lists
trigger programs that have been assigned since
the last time that you ran the report.
28, 67
PRTUSROBJ
29, 68
PRTUSRPRF
30, 69
PRTPRFINT
606
QSECPUOLD2
Command Name
Description
31, 70
CHKOBJITG
Notes:
1. Options are from the SECBATCH menu.
2. This file is in the QUSRSYS library.
3. xx is the two-character journal entry type. For example, the model output file for AE journal entries is
QSYS/QASYAEJE. The model output files are described in Appendix F of this book.
4. The SECTOOLS menu contains options for the object types that are typically of concern to security
administrators. For example, use options 11 or 50 to run the PRTPUBAUT command against *FILE objects. Use
the general options (18 and 57) to specify the object type. Use options 12 and 51 to run the PRTPVTAUT
command against *FILE objects. Use the general options (19 and 58) to specify the object type.
5. The xxxxxx in the name of the file is the object type. For example, the file for program objects is called QPBPGM
for public authorities and QPVPGM for private authorities. The files are in the QUSRSYS library.
The file contains a member for each library for which you have printed the report. The member name is the
same as the library name.
Command Name
Description
60
CFGSYSSEC
61
RVKPUBAUT
Notes:
1. Options are from the SECTOOLS menu.
607
Setting
QAUTOCFG
0 (No)
QAUTOVRT
QALWOBJRST
*NONE
QDEVRCYACN
*DSCMSG (Disconnect
with message)
QDSCJOBITV
120
QDSPSGNINF
1 (Yes)
QINACTITV
60
QINACTMSGQ
*ENDJOB
QLMTDEVSSN
1 (Yes)
QLMTSECOFR
1 (Yes)
QMAXSIGN
QMAXSGNACN
3 (Both)
QRMTSIGN
*FRCSIGNON
0 (Off)
50
QPWDEXPITV
60
QPWDMINLEN
QPWDMAXLEN
QPWDPOSDIF
1 (Yes)
QPWDLMTCHR
See note 2
QPWDLMTAJC
1 (Yes)
QPWDLMTREP
2 (Cannot be repeated
consecutively)
QPWDRQDDGT
1 (Yes)
QPWDRQDDIF
1 (32 unique passwords) How many unique passwords are required before a password can
be repeated
QPWDVLDPGM
*NONE
QRMTSVRATR
QSECURITY
The user exit program that the system calls to validate passwords
Notes:
1. If you are currently running with a QSECURITY value of 30 or lower, be sure to review the information in
Chapter 2 of this book before you change to a higher security level.
2. The restricted characters are stored in message ID CPXB302 in the message file QSYS/QCPFMSG. They are
shipped as AEIOU@$#. You can use the Change Message Description (CHGMSGD) command to change the
restricted characters.
The CFGSYSSEC command also sets the password to *NONE for the following
IBM-supplied user profiles:
608
QSYSOPR
QPGMR
QUSER
QSRV
QSRVBAS
Finally, the CFGSYSSEC command sets up security auditing according to the
values that you have specified by using the Change Security Auditing
(CHGSECAUD) command.
609
language on your system, you need to run the command for each QSYSxxx library.
Table 224. Commands Whose Public Authority Is Set by the RVKPUBAUT Command
ADDAJE
ADDCFGLE
ADDCMNE
ADDJOBQE
ADDPJE
ADDRTGE
ADDWSE
CHGAJE
CHGCFGL
CHGCFGLE
CHGCMNE
CHGCTLAPPC
CHGDEVAPPC
CHGJOBQE
CHGPJE
CHGRTGE
CHGSBSD
CHGWSE
CPYCFGL
CRTCFGL
CRTCTLAPPC
CRTDEVAPPC
CRTSBSD
ENDRMTSPT
RMVAJE
RMVCFGLE
RMVCMNE
RMVJOBQE
RMVPJE
RMVRTGE
RMVWSE
RSTLIB
RSTOBJ
RSTS36F
RSTS36FLR
RSTS36LIBM
STRRMTSPT
STRSBS
WRKCFGL
On V3R7, when you run the RVKPUBAUT command, the system sets the public
authority for the root directory to *USE (unless it is already *USE or less).
610
Appendix H. Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the users responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
500 Columbus Avenue
Thornwood, NY 10594
U.S.A.
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or region or send inquiries, in
writing, to:
IBM World Trade Asia Corporation
Licensing
2-31 Roppongi 3-chome, Minato-ku
Tokyo 106-0032, Japan
The following paragraph does not apply to the United Kingdom or any other
country or region where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply
to you.
This information could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein; these changes will be
incorporated in new editions of the publication. IBM may make improvements
and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
Copyright IBM Corp. 1996, 2002
611
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
Software Interoperability Coordinator
3605 Highway 52 N
Rochester, MN 55901-7829
U.S.A.
Such information may be available, subject to appropriate terms and conditions,
including in some cases, payment of a fee.
The licensed program described in this information and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement, or any equivalent agreement
between us.
Any performance data contained herein was determined in a controlled
environment. Therefore, the results obtained in other operating environments may
vary significantly. Some measurements may have been made on development-level
systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurement may have been
estimated through extrapolation. Actual results may vary. Users of this document
should verify the applicable data for their specific environment.
Information concerning non-IBM products was obtained from the suppliers of
those products, their published announcements or other publicly available sources.
IBM has not tested those products and cannot confirm the accuracy of
performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the
suppliers of those products.
All statements regarding IBMs future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which
illustrates programming techniques on various operating platforms. You may copy,
modify, and distribute these sample programs in any form without payment to
IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating
platform for which the sample programs are written. These examples have not
been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or
imply reliability, serviceability, or function of these programs. You may copy,
modify, and distribute these sample programs in any form without payment to
IBM for the purposes of developing, using, marketing, or distributing application
programs conforming to IBMs application programming interfaces.
If you are viewing this information softcopy, the photographs and color
illustrations may not appear.
612
Trademarks
The following terms are trademarks of International Business Machines
Corporation in the United States, or other countries, or both:
Advanced Function Printing
APPN
Application System/400
AS/400
AS/400e
C/400
CallPath/400
DB2 for OS/400
DRDA
e (Stylized)
FFST
IBM
Integrated Language Environment
iSeriesLotus
Lotus Domino
LPDA
Operating System/400
Operational Assistant
OS/2
OS/400
PrintManager
Print Service Facility
RPG/400
SecureWay
SQL/400
SystemView
System/36
System/38
400
C-bus is a trademark of Corollary, Inc.
Microsoft, Windows, Windows NT, and the Windows 95 logo are registered
trademarks of Microsoft Corporation.
Java and HotJava are trademarks of Sun Microsystems, Inc.
UNIX is a registered trademark in the United States and other countries licensed
exclusively through X/Open Company Limited.
PC Direct is a trademark of Ziff Communications Company and is used by IBM
Corporation under license.
Other company, product, and service names may be trademarks or service marks
of others.
Appendix H. Notices
613
614
Related information
You may need to refer to other IBM books for
more specific information about a particular topic.
The following IBM iSeries books contain
information that you may need.
Advanced Security
v Tips and Tools for Securing Your iSeries,
SC41-5300-06, provides a set of practical
suggestions for using the security features of
iSeries and for establishing operating
procedures that are securityconscious. This
book also describes how to set up and use
security and use security tools that are part of
OS/400. See the iSeries: Information Center
Supplemental Manuals CD-ROM.
v Implementing iSeries 400 Security, 3rd Edition by
Wayne Madden and Carol Woodbury.
Loveland, Colorado: 29th Street Press, a
division of Duke Communication International,
1998. Provides guidance and practical
suggestions for planning, setting up, and
managing your iSeries security.
ISBN Order Number
1882419782
615
Cryptography
v Cryptographic Support/400, SC41-3342-00,
describes the data security capabilities of the
Cryptographic Facility licensed program
product. It explains how to use the facility and
provides reference information for
programmers. See the iSeries: Information
Center Supplemental Manuals CD-ROM.
IBM-Supplied Program
Installation and System
Configuration
v Local Device Configuration, SC41-5121-00,
provides information about how to do an initial
configuration and how to change that
configuration. It also contains conceptual
information about device configuration. See the
iSeries: Information Center Supplemental
Manuals CD-ROM.
v Software Installation, SC41-5120-06, provides
step-by-step procedures for initial install,
installing licensed programs, program
temporary fixes (PTFs), and secondary
languages from IBM. See the iSeries:
Information Center Supplemental Manuals
CD-ROM.
Optical Support
The Internet
v AS/400 Internet Security: Protecting Your AS/400
from HARM on the Internet SG244929 discusses
the security issues and the risk associated with
connecting your iSeries to the Internet. It
provides examples, recommendations, tips, and
techniques for applications.
616
Printing
v The Information Center provides information
on printing elements and concepts of the
system, printer file and print spooling support
for printing operation, and printer connectivity.
See Prerequisite and related information on
page xvi for details.
Programming
v CL Programming, SC41-5721-05, provides a
wide-ranging discussion of programming
topics, including a general discussion of objects
and libraries, CL programming, controlling
flow and communicating between programs,
working with objects in CL programs, and
creating CL programs. Other topics include
predefined and impromptu messages and
message handling, defining and creating
user-defined commands and menus, application
testing, including debug mode, breakpoints,
traces, and display functions. See the iSeries:
Information Center Supplemental Manuals
CD-ROM.
v The CL topic in the Information Center (see
Prerequisite and related information on
page xvi for details) provides a description of
all the iSeries control language (CL) and its
OS/400 commands. The OS/400 commands are
used to request functions of the Operating
System/400 (5738-SS1) licensed program. All
the non-OS/400 CL commandsthose
associated with the other licensed programs,
including all the various languages and
utilitiesare described in other books that
support those licensed programs.
v The Programming topic in the Information
Center provides information about many of the
languages and utilities available on the iSeries.
It contains summaries of:
All iSeries CL commands (in OS/400
program and in all other licensed programs),
in various forms.
Information related to CL commands, such
as the error messages that can be monitored
by each command, and the IBM-supplied
files that are used by some commands.
IBM-supplied objects, including libraries.
IBM-supplied system values.
DDS keywords for physical, logical, display,
printer, and ICF files.
REXX instructions and built-in functions.
Utilities
v WebSphere Development Studio: Application
Development Manager Users Guide,
SC09-2133-02, provides information about using
the Application Development Tools
programming development manager (PDM) to
work with lists of libraries, objects, members,
and user-defined options to easily do such
operations as copy, delete, and rename.
This book contains activities and reference
material to help the user learn PDM. The most
commonly used operations and function keys
are explained in detail using examples.
v ADTS for AS/400: Source Entry Utility,
SC09-2605-00, provides information about using
the Application Development Tools source
entry utility (SEU) to create and edit source
members. The book explains how to start and
end an SEU session and how to use the many
features of this full-screen text editor. The book
contains examples to help both new and
experienced users accomplish various editing
tasks, from the simplest line commands to
using pre-defined prompts for high-level
languages and data formats.See the iSeries:
Information Center Supplemental Manuals
CD-ROM.
Related information
617
618
Index
Special Characters
(*Mgt) Management authority 120
(*Ref) Reference authority 120
(Display Link) command
object authority required 351
(Move) command
object authority required 351
(user identification number) parameter
user profile 99
*ADD (add) authority 120, 309
*ADOPTED (adopted) authority 142
*ADVANCED (advanced) assistance
level 71
*ALL (all) authority 121, 310
*ALLOBJ 79
user class authority 10
*ALLOBJ (all object) special authority
added by system
changing security levels 13
auditing 250
failed sign-on 187
functions allowed 76
removed by system
changing security levels 13
restoring profile 238
risks 76
*ALRTBL (alert table) object
auditing 446
*ASSIST Attention-key-handling
program 95
*AUDIT (audit) special authority
functions allowed 78
risks 79
*AUTFAIL (authority failure) audit
level 255
*AUTHLR (authority holder) object
auditing 447
*AUTL (authorization list) object
auditing 446
*AUTLMGT (authorization list
management) authority 120, 309
*BASIC (basic) assistance level 71
*BNDDIR (binding directory) object
auditing 447
*BREAK (break) delivery mode
user profile 92
*CFGL (configuration list) object
auditing 448
*CHANGE (change) authority 121, 310
*CHRSF (Special Files) object
auditing 448
*CHTFMT (chart format) object
auditing 448
*CLD (C locale description) object
auditing 450
*CLKWD (CL keyword) user option 97,
98
*CLS (Class) object auditing 450
*CMD (command string) audit level 255
*CMD (Command) object auditing 450
619
620
A
access
preventing
unauthorized 251
unsupported interface 15
access (continued)
restricting
console 248
workstations 248
unauthorized
audit journal entry 255
access code
object authority required for
commands 399
access command (Determine File
Accessibility)
object auditing 454
access control list
changing
audit journal (QAUDJRN)
entry 255
access control list change (VA) journal
entry type 255
access path recovery
action auditing 446
object authority required for
commands 319
accessx command (Determine File
Accessibility)
object auditing 454
account limit
exceeded
audit journal (QAUDJRN)
entry 255
account limit exceeded (VL) file
layout 583
account limit exceeded (VL) journal entry
type 255
accounting code (ACGCDE) parameter
changing 90
user profile 90
Accumulating Special Authorities 230
ACGCDE (accounting code) parameter
changing 90
user profile 90
action auditing
access path recovery 446
definition 253
directory services 457
mail services 475
office services 475
planning 253
reply list 487
spooled files 491
action auditing (AUDLVL) parameter
user profile 102
action to spooled file (SF) file layout 572
action to system value (SV) file
layout 581
action when sign-on attempts reached
(QMAXSGNACN) system value
description 31
value set by CFGSYSSEC
command 607
activating
security auditing function 267
user profile 599
active profile list
changing 599
AD (auditing change) file layout 506
AD (auditing change) journal entry
type 255
Index
621
622
alert description
object authority required for
commands 320
alert table
object authority required for
commands 320
alert table (*ALRTBL) object
auditing 446
all (*ALL) authority 121, 310
all object (*ALLOBJ) special authority
added by system
changing security levels 13
auditing 250
failed sign-on 187
functions allowed 76
removed by system
changing security levels 13
restoring profile 238
risks 76
all-numeric password 66
allow limited user (ALWLMTUSR)
parameter
Change Command (CHGCMD)
command 74
Create Command (CRTCMD)
command 74
limit capabilities 74
allow object difference (ALWOBJDIF)
parameter 239
allow object restore (QALWOBJRST)
system value
value set by CFGSYSSEC
command 607
allow object restore option
(QALWOBJRST) system value 43
allow remote sign-on (QRMTSIGN)
system value
value set by CFGSYSSEC
command 607
allow user objects (QALWUSRDMN)
system value 20, 25
allowed function
limit capabilities (LMTCPB) 74
allowing
users to change passwords 249
alter service function
*SERVICE (service) special
authority 77
ALWLMTUSR (allow limited user)
parameter
Change Command (CHGCMD)
command 74
Create Command (CRTCMD)
command 74
limit capabilities 74
ALWOBJDIF (allow object difference)
parameter 239
Analyze Default Passwords
(ANZDFTPWD) command
description 599
Analyze Profile Activity (ANZPRFACT)
command
creating exempt users 599
description 599
analyzing
audit journal entries, methods 272
object authority 279
analyzing (continued)
program failure 279
user profile
by special authorities 603
by user class 603
user profiles 277
ANSLIN (Answer Line) command
object auditing 474
ANSQST (Answer Questions) command
authorized IBM-supplied user
profiles 299
object authority required 416
ANZACCGRP (Analyze Access Group)
command
object authority required 405
ANZBESTMDL (Analyze BEST/1 Model)
command
object authority required 405
ANZDBF (Analyze Database File)
command
object authority required 405
ANZDBFKEY (Analyze Database File
Keys) command
object authority required 405
ANZDFTPWD (Analyze Default
Password) command
object authority required 436
ANZDFTPWD (Analyze Default
Passwords) command
authorized IBM-supplied user
profiles 299
description 599
ANZPFRDT2 (Analyze Performance
Data) command
object authority required 405
ANZPFRDTA (Analyze Performance
Data) command
object authority required 405
ANZPGM (Analyze Program) command
object auditing 483
object authority required 405
ANZPRB (Analyze Problem) command
authorized IBM-supplied user
profiles 299
object authority required 411
ANZPRFACT (Analyze Profile Activity)
command
authorized IBM-supplied user
profiles 299
creating exempt users 599
description 599
object authority required 436
ANZQRY (Analyze Query) command
object auditing 486
object authority required 415
ANZS34OCL (Analyze System/34 OCL)
command
authorized IBM-supplied user
profiles 299
object authority required 393
ANZS34OCL (Analyze System/36 OCL)
command
object authority required 393
ANZS36OCL (Analyze System/36 OCL)
command
authorized IBM-supplied user
profiles 299
Index
623
624
625
auditing (continued)
planning
overview 253
system values 265
program failure 279
programmer authorities 250
QTEMP objects 267
remote sign-on 252
reply list 487
save operations 245
security officer 280
sensitive data
authority 250
encrypting 252
setting up 267
sign-on without user ID and
password 251
spooled files 491
starting 267
steps to start 267
stopping 58, 272
system values 58, 248, 265
unauthorized access 251
unauthorized programs 252
unsupported interfaces 252
user profile
*ALLOBJ (all object) special
authority 250
administration 250
using
journals 276
QHST (history) log 276
QSYSMSG message queue 252
working on behalf 475
working with user 115
auditing change (AD) file layout 506
auditing change (AD) journal entry
type 255
auditing control (QAUDCTL) system
value
overview 58
auditing end action (QAUDENDACN)
system value 59, 266
auditing force level (QAUDFRCLVL)
system value 60, 265
auditing level (QAUDLVL) system
value 61
AUDLVL (audit level) parameter
*CMD (command string) value 255
user profile 102
AUT (authority) parameter
creating libraries 144
creating objects 145
specifying authorization list
(*AUTL) 154
user profile 100
AUTCHK (authority to check)
parameter 198
authentication
digital ID 103
Authorities, Accumulating Special 230
authorities, field 123
Authorities, Special 230
authority
*ADD (add) 120, 309
*ALL (all) 121, 310
626
authority (continued)
*ALLOBJ (all object) special
authority 76
*AUDIT (audit) special authority 78
*AUTLMGT (authorization list
management) 120, 127, 309
*CHANGE (change) 121, 310
*DLT (delete) 120, 309
*EXCLUDE (exclude) 121
*EXECUTE (execute) 120, 309
*IOSYSCFG (system configuration)
special authority 79
*JOBCTL (job control) special
authority 76
*Mgt 120
*OBJALTER (object alter) 120, 309
*OBJEXIST (object existence) 120, 309
*OBJMGT (object management) 120,
309
*OBJOPR (object operational) 120,
309
*OBJREF (object reference) 120, 309
*R (read) 122, 310
*READ (read) 120, 309
*Ref (Reference) 120
*RW (read, write) 122, 310
*RWX (read, write, execute) 122, 310
*RX (read, execute) 122, 310
*SAVSYS (save system) special
authority 77
*SECADM (security administrator)
special authority 76
*SERVICE (service) special
authority 77
*SPLCTL (spool control) special
authority 77
*UPD (update) 120, 309
*USE (use) 121, 310
*W (write) 122, 310
*WX (write, execute) 122, 310
*X (execute) 122, 310
See also authority checking
adding users 148
adopted 512
application design 218, 220, 222
audit journal (QAUDJRN)
entry 255
auditing 279
authority checking example 176,
178
displaying 142, 224
ignoring 220
purpose 135
assigning to new object 131
authorization for changing 146
authorization list
format on save media 237
management (*AUTLMGT) 120,
309
stored on save media 237
storing 236
changing 513
audit journal (QAUDJRN)
entry 255
command description 284
procedures 146
checking 156
authority (continued)
batch job initiation 186
interactive job initiation 185
sign-on process 185
commonly used subsets 121
copying
command description 286
example 109
recommendations 153
renaming profile 115
data
definition 120
definition 120
deleting user 148
detail, displaying (*EXPERT user
option) 97, 98
directory 5
displaying
command description 284
displaying detail (*EXPERT user
option) 97, 98
displays 141
field
definition 120
group
displaying 142
example 173, 177
holding when deleting file 139
ignoring adopted 139
introduction 5
library 5
Management authority
*Mgt(*) 120
multiple objects 149
new object
CRTAUT (create authority)
parameter 127, 144
example 131
GRPAUT (group authority)
parameter 88, 129
GRPAUTTYP (group authority
type) parameter 89
QCRTAUT (create authority)
system value 25
QUSEADPAUT (use adopted
authority) system value 34
object
*ADD (add) 120, 309
*DLT (delete) 120, 309
*EXECUTE (execute) 120, 309
*OBJEXIST (object existence) 120,
309
*OBJMGT (object
management) 120, 309
*OBJOPR (object operational) 120,
309
*READ (read) 120, 309
*Ref (Reference) 120
*UPD (update) 120, 309
definition 120
exclude (*EXCLUDE) 121
format on save media 237
stored on save media 237
storing 236
object alter (*OBJALTER) 120, 309
object reference (*OBJREF) 120, 309
primary group 119, 130
authority (continued)
example 174
working with 112
private
definition 119
restoring 235, 240
saving 235
public
definition 119
example 175, 178
restoring 235, 239
saving 235
referenced object
using 153
removing user 148
restoring
audit journal (QAUDJRN)
entry 255
command description 287
description of process 241
overview of commands 235
procedure 240
special (SPCAUT) authority
parameter 75
storing
authorization list 236
with object 236
with user profile 236
system-defined subsets 121
user profile
format on save media 237
stored on save media 237
storing 236
user-defined 147
using generic to grant 149
working with
command description 284
authority (AUT) parameter
creating libraries 144
creating objects 145
specifying authorization list
(*AUTL) 154
user profile 100
authority cache
private authorities 184
authority change (CA) file layout 513
authority change (CA) journal entry
type 255
authority change for restored object (RA)
file layout 563
authority change for restored object (RA)
journal entry type 255
authority checking
See also authority
adopted authority
example 176, 178
flowchart 169
authorization list
example 179
group authority
example 173, 177
owner authority
flowchart 162
primary group
example 174
private authority
flowchart 161
627
B
backing up
security information 235
backup
object authority required for
commands 400
backup media
protecting 248
basic (*BASIC) assistance level 64, 71
basic service (QSRVBAS) user profile
authority to console 189
default values 293
batch
restricting jobs 205
batch job
*SPLCTL (spool control) special
authority 77
priority 85
security when starting 185, 186
BCHJOB (Batch Job) command
object authority required 368
binding directory
object authority required for
commands 323
binding directory object auditing 447
bound program
adopted authority 138
definition 138
break (*BREAK) delivery mode
user profile 92
break-message-handling program
adopted authority 137
BRM (QBRMS) user profile 293
buffering
Attention key 83
keyboard 83
C
C locale description (*CLD) auditing 450
C2 security
description 6
CA (authority change) file layout 513
CA (authority change) journal entry
type 255
CALL (Call Program) command
object authority required 412
transferring adopted authority 136
Call Program (CALL) command
transferring adopted authority 136
call-level interface
security level 40 15
calling
program
transferring adopted
authority 136
canceling
audit function 272
628
cartridge
object authority required for
commands 390
CCSID (coded character set identifier)
parameter
user profile 96
CD (command string) file layout 516
CD (command string) journal entry
type 255
CFGDSTSRV (Configure Distribution
Services) command
authorized IBM-supplied user
profiles 299
object authority required 336
CFGIPS (Configure IP over SNA
Interface) command
object authority required 320
CFGRPDS (Configure VM/MVS Bridge)
command
authorized IBM-supplied user
profiles 299
object authority required 336
CFGSYSSEC (Configure System Security)
command
authorized IBM-supplied user
profiles 299
description 290, 607
object authority required 423
CFGTCP (Configure TCP/IP) command
object authority required 434
CFGTCPAPP (Configure TCP/IP
Applications) command
object authority required 434
CFGTCPLPD (Configure TCP/IP LPD)
command
object authority required 434
CFGTCPSMTP (Configure TCP/IP SMTP)
command
object authority required 434
CFGTCPTELN (Change TCP/IP
TELNET) command
object authority required 434
change (*CHANGE) authority 121, 310
change *CRQD object (CQ) journal entry
type 255
Change Accounting Code
(CHGACGCDE) command 90
Change Activation Schedule Entry
(CHGACTSCDE) command
description 599
Change Active Profile List
(CHGACTPRFL) command
description 599
Change Auditing (CHGAUD) command
description 284, 287
using 115
Change Authority (CHGAUT)
command 147, 284
Change Authorization List Entry
(CHGAUTLE) command
description 283
using 154
Change Command (CHGCMD) command
ALWLMTUSR (allow limited user)
parameter 74
PRDLIB (product library)
parameter 196
changing (continued)
adopted authority
authority required 137
audit journal receiver 270, 271
auditing
command description 284, 287
authority
audit journal (QAUDJRN)
entry 255
command description 284
procedures 146
authorization list
entry 283
user authority 154
changing
audit journal (QAUDJRN)
entry 255
command
ALWLMTUSR (allow limited user)
parameter 74
defaults 224
current library 193, 196
device description
owner 189
directory entry 288
document library object (DLO)
authority 287
owner 287
primary group 287
document library object auditing
command description 287
DST (dedicated service tools)
password 117
DST (dedicated service tools) user
ID 117
IBM-supplied user profile
passwords 117
IPC object
audit journal (QAUDJRN)
entry 255
job
adopted authority 137
audit journal (QAUDJRN)
entry 255
job description
audit journal (QAUDJRN)
entry 255
library list 193
menu
PRDLIB (product library)
parameter 196
security risks 196
network attribute
audit journal (QAUDJRN)
entry 255
security-related 200
network profile
audit journal (QAUDJRN)
entry 255
object auditing 78, 284, 287
command description 287
object owner 151, 284
object ownership
moving application to
production 231
output queue 197
changing (continued)
ownership
device description 189
password
description 285
DST (dedicated service tools) 117,
285
enforcing password system
values 45
IBM-supplied user profiles 117
setting password equal to profile
name 67
primary group 130, 284
audit journal (QAUDJRN)
entry 255
primary group during restore
audit journal (QAUDJRN)
entry 255
profile
See changing user profile
program
specifying USEADPAUT
parameter 139
program adopt
audit journal (QAUDJRN)
entry 255
QAUDCTL (audit control) system
value 289
QAUDLVL (audit level) system
value 289
routing entry
audit journal (QAUDJRN)
entry 255
security auditing 289, 601
security level (QSECURITY) system
value
level 10 to level 20 12
level 20 to level 30 13
level 20 to level 40 18
level 20 to level 50 21
level 30 to level 20 13
level 30 to level 40 18
level 30 to level 50 21
level 40 to level 20 13
level 40 to level 30 19
level 50 to level 30 or 40 21
server authentication entry 288
spooled file
audit journal (QAUDJRN)
entry 255
system directory
audit journal (QAUDJRN)
entry 255
system library list 193, 216
system management
audit journal (QAUDJRN)
entry 255
system value
audit journal (QAUDJRN)
entry 255
user auditing 78, 286, 287
user authority
authorization list 154
user ID
DST (dedicated service tools) 117
Index
629
changing (continued)
user profile
audit journal (QAUDJRN)
entry 255
command descriptions 285, 286
methods 109
password composition system
values 45
setting password equal to profile
name 67
changing access control list (VA) file
layout 581
chart format
object authority required for
commands 324
chart format (*CHTFMT) auditing 448
Check Object Integrity (CHKOBJITG)
command
auditing use 252
description 280, 286, 603
Check Password (CHKPWD)
command 116, 285
checking
See also authority checking
altered objects 280
default passwords 599
object integrity 603
auditing use 252
description 280, 286
password 116, 285
checklist
auditing security 247
planning security 247
CHGACGCDE (Change Accounting
Code) command
object authority required 368
relationship to user profile 90
CHGACTPRFL (Change Active Profile
List) command
description 599
object authority required 436
CHGACTSCDE (Change Activation
Schedule Entry) command
description 599
CHGACTSCDE (Change Activity
Schedule Entry) command
object authority required 436
CHGAJE (Change Autostart Job Entry)
command
object auditing 488
object authority required 428
CHGALRACNE (Change Alert Action
Entry) command
object auditing 468
object authority required 349
CHGALRD (Change Alert Description)
command
object auditing 446
object authority required 320
CHGALRSLTE (Change Alert Selection
Entry) command
object auditing 468
object authority required 349
CHGALRTBL (Change Alert Table)
command
object auditing 446
object authority required 320
630
Index
631
632
633
634
command, CL (continued)
ADDDLOAUT (Add Document
Library Object Authority) 287
ADDJOBSCDE (Add Job Schedule
Entry)
SECBATCH menu 602
ADDLIBLE (Add Library List
Entry) 193, 196
ADDSVRAUTE (Add Server
Authentication Entry) 288
allowed for limit capabilities user 74
ALWLMTUSR (allow limited user)
parameter 74
ANZDFTPWD (Analyze Default
Passwords)
description 599
ANZPRFACT (Analyze Profile
Activity)
creating exempt users 599
description 599
authority holders, table 283, 288
authorization lists 283
CALL (Call Program)
transferring adopted
authority 136
Call Program (CALL)
transferring adopted
authority 136
CFGSYSSEC (Configure System
Security)
description 290, 607
Change Accounting Code
(CHGACGCDE) 90
Change Authorization List Entry
(CHGAUTLE)
description 283
using 154
Change Command (CHGCMD)
ALWLMTUSR (allow limited user)
parameter 74
PRDLIB (product library)
parameter 196
security risks 196
Change Command Default
(CHGCMDDFT) 224
Change Current Library
(CHGCURLIB)
restricting 196
Change Dedicated Service Tools
Password (CHGDSTPWD) 285
Change Directory Entry
(CHGDIRE) 288
Change Document Library Object
Auditing (CHGDLOAUD) 287
*AUDIT (audit) special
authority 78
description 287
QAUDCTL (Auditing Control)
system value 58
Change Document Library Object
Authority (CHGDLOAUT) 287
Change Document Library Object
Owner (CHGDLOOWN) 287
Change Document Library Object
Primary (CHGDLOPGP) 287
Change Job (CHGJOB)
adopted authority 137
Index
635
command, CL (continued)
Change Journal (CHGJRN) 270, 271
Change Library List (CHGLIBL) 193
Change Menu (CHGMNU)
PRDLIB (product library)
parameter 196
security risks 196
Change Network Attributes
(CHGNETA) 200
Change Object Auditing
(CHGOBJAUD) 284
*AUDIT (audit) special
authority 78
description 287
QAUDCTL (Auditing Control)
system value 58
Change Object Owner
(CHGOBJOWN) 151, 284
Change Object Primary Group
(CHGOBJPGP) 130, 152, 284
Change Output Queue
(CHGOUTQ) 197
Change Password (CHGPWD)
auditing 249
description 285
enforcing password system
values 45
setting password equal to profile
name 67
Change Profile (CHGPRF) 109, 286
Change Program (CHGPGM)
specifying USEADPAUT
parameter 139
Change Security Auditing
(CHGSECAUD)
description 289
Change Server Authentication Entry
(CHGSVRAUTE) 288
Change Service Program
(CHGSRVPGM)
specifying USEADPAUT
parameter 139
Change Spooled File Attributes
(CHGSPLFA) 198
Change System Library List
(CHGSYSLIBL) 193, 216
Change User Audit
(CHGUSRAUD) 286
*AUDIT (audit) special
authority 78
description 287
QAUDCTL (Auditing Control)
system value 59
using 115
Change User Profile
(CHGUSRPRF) 286
description 285
password composition system
values 45
setting password equal to profile
name 67
using 109
Check Object Integrity (CHKOBJITG)
auditing use 252
description 280, 286
Check Password (CHKPWD) 116,
285
636
command, CL (continued)
CHGACGCDE (Change Accounting
Code) 90
CHGACTPRFL (Change Active Profile
List)
description 599
CHGACTSCDE (Change Activation
Schedule Entry)
description 599
CHGAUTLE (Change Authorization
List Entry)
description 283
using 154
CHGCMD (Change Command)
ALWLMTUSR (allow limited user)
parameter 74
PRDLIB (product library)
parameter 196
security risks 196
CHGCMDDFT (Change Command
Default) 224
CHGCURLIB (Change Current
Library)
restricting 196
CHGDIRE (Change Directory
Entry) 288
CHGDLOAUD (Change Document
Library Object Auditing) 287
*AUDIT (audit) special
authority 78
QAUDCTL (Auditing Control)
system value 58
CHGDLOAUT (Change Document
Library Object Authority) 287
CHGDLOOWN (Change Document
Library Object Owner) 287
CHGDLOPGP (Change Document
Library Object Primary) 287
CHGDLOUAD (Change Document
Library Object Auditing)
description 287
CHGDSTPWD (Change Dedicated
Service Tools Password) 285
CHGEXPSCDE (Change Expiration
Schedule Entry)
description 599
CHGJOB (Change Job)
adopted authority 137
CHGJRN (Change Journal) 270, 271
CHGLIBL (Change Library List) 193
CHGMNU (Change Menu)
PRDLIB (product library)
parameter 196
security risks 196
CHGNETA (Change Network
Attributes) 200
CHGOBJAUD (Change Object
Auditing) 284
*AUDIT (audit) special
authority 78
description 287
QAUDCTL (Auditing Control)
system value 58
CHGOBJOWN (Change Object
Owner) 151, 284
CHGOBJPGP (Change Object Primary
Group) 130, 152, 284
command, CL (continued)
CHGOUTQ (Change Output
Queue) 197
CHGPGM (Change Program)
specifying USEADPAUT
parameter 139
CHGPRF (Change Profile) 109, 286
CHGPWD (Change Password)
auditing 249
description 285
enforcing password system
values 45
setting password equal to profile
name 67
CHGSECAUD (Change Security
Auditing)
description 289, 601
CHGSPLFA (Change Spooled File
Attributes) 198
CHGSRVPGM (Change Service
Program)
specifying USEADPAUT
parameter 139
CHGSVRAUTE (Change Server
Authentication Entry) 288
CHGSYSLIBL (Change System Library
List) 193, 216
CHGUSRAUD (Change User
Audit) 286
*AUDIT (audit) special
authority 78
description 287
QAUDCTL (Auditing Control)
system value 59
using 115
CHGUSRPRF (Change User
Profile) 286
description 285
password composition system
values 45
setting password equal to profile
name 67
using 109
CHKOBJITG (Check Object Integrity)
auditing use 252
description 280, 286, 603
CHKPWD (Check Password) 116,
285
Configure System Security
(CFGSYSSEC)
description 290
Copy Spooled File (CPYSPLF) 198
CPYSPLF (Copy Spooled File) 198
Create Authority Holder
(CRTAUTHLR) 139, 283, 288
Create Authorization List
(CRTAUTL) 153, 283
Create Command (CRTCMD)
ALWLMTUSR (allow limited user)
parameter 74
PRDLIB (product library)
parameter 196
security risks 196
Create Journal (CRTJRN) 268
Create Journal Receiver
(CRTJRNRCV) 268
Create Library (CRTLIB) 144
command, CL (continued)
Create Menu (CRTMNU)
PRDLIB (product library)
parameter 196
security risks 196
Create Output Queue
(CRTOUTQ) 197, 200
Create User Profile (CRTUSRPRF)
description 105, 285, 286
CRTAUTHLR (Create Authority
Holder) 139, 283, 288
CRTAUTL (Create Authorization
List) 153, 283
CRTCMD (Create Command)
ALWLMTUSR (allow limited user)
parameter 74
PRDLIB (product library)
parameter 196
security risks 196
CRTJRN (Create Journal) 268
CRTJRNRCV (Create Journal
Receiver) 268
CRTLIB (Create Library) 144
CRTMNU (Create Menu)
PRDLIB (product library)
parameter 196
security risks 196
CRTOUTQ (Create Output
Queue) 197, 200
CRTUSRPRF (Create User Profile)
description 105, 285, 286
Delete Authority Holder
(DLTAUTHLR) 140, 283
Delete Authorization List
(DLTAUTL) 155, 283
Delete Journal Receiver
(DLTJRNRCV) 272
Delete User Profile (DLTUSRPRF)
description 286
example 110
object ownership 129
Display Audit Journal Entries
(DSPAUDJRNE)
description 289
Display Authority Holder
(DSPAUTHLR) 139, 283
Display Authorization List
(DSPAUTL) 283
Display Authorization List Document
Library Objects
(DSPAUTLDLO) 287
Display Authorization List Objects
(DSPAUTLOBJ) 155, 283
Display Authorized Users
(DSPAUTUSR)
auditing 277
description 286
example 113
Display Document Library Object
Auditing (DSPDLOAUD) 265, 287
Display Document Library Object
Authority (DSPDLOAUT) 287
Display Job Description
(DSPJOBD) 251
Display Journal (DSPJRN)
audit (QAUDJRN) journal
example 272, 273
command, CL (continued)
Display Journal (DSPJRN) (continued)
auditing file activity 224, 277
creating output file 274
displaying QAUDJRN (audit)
journal 252
Display Library (DSPLIB) 279
Display Library Description
(DSPLIBD)
CRTAUT parameter 145
Display Object Authority
(DSPOBJAUT) 279, 284
Display Object Description
(DSPOBJD) 265, 284
created by 130
object domain 15
program state 16
using output file 278
Display Program (DSPPGM)
adopted authority 138
program state 16
Display Programs That Adopt
(DSPPGMADP)
auditing 279
description 287
using 138, 224
Display Security Auditing
(DSPSECAUD Values)
description 289
Display Service Program
(DSPSRVPGM)
adopted authority 138
Display Spooled File (DSPSPLF) 198
Display User Profile (DSPUSRPRF)
description 286
using 113
using output file 278
displaying keywords (*CLKWD user
option) 97, 98
DLTAUTHLR (Delete Authority
Holder) 140, 283
DLTAUTL (Delete Authorization
List) 155, 283
DLTJRNRCV (Delete Journal
Receiver) 272
DLTUSRPRF (Delete User Profile)
description 286
example 110
object ownership 129
document library object (DLO)
table 287
DSPACTPRFL (Display Active Profile
List)
description 599
DSPACTSCD (Display Activation
Schedule)
description 599
DSPAUDJRNE (Display Audit Journal
Entries)
description 289, 603
DSPAUTHLR (Display Authority
Holder) 139, 283
DSPAUTL (Display Authorization
List) 283
DSPAUTLDLO (Display Authorization
List Document Library Objects) 287
command, CL (continued)
DSPAUTLOBJ (Display Authorization
List Objects) 155, 283
DSPAUTUSR (Display Authorized
Users)
auditing 277
description 286
example 113
DSPDLOAUD (Display Document
Library Object Auditing) 265, 287
DSPDLOAUT (Display Document
Library Object Authority) 287
DSPEXPSCD (Display Expiration
Schedule)
description 599
DSPJOBD (Display Job
Description) 251
DSPJRN (Display Journal)
audit (QAUDJRN) journal
example 272, 273
auditing file activity 224, 277
creating output file 274
displaying QAUDJRN (audit)
journal 252
DSPLIB (Display Library) 279
DSPLIBD (Display Library
Description)
CRTAUT parameter 145
DSPOBJAUT (Display Object
Authority) 279, 284
DSPOBJD (Display Object
Description) 265, 284
created by 130
object domain 15
program state 16
using output file 278
DSPPGM (Display Program)
adopted authority 138
program state 16
DSPPGMADP (Display Programs That
Adopt)
auditing 279
description 287
using 138, 224
DSPSECAUD (Display Security
Auditing Values)
description 289
DSPSECAUD (Display Security
Auditing)
description 601
DSPSPLF (Display Spooled File) 198
DSPSRVPGM (Display Service
Program)
adopted authority 138
DSPUSRPRF (Display User Profile)
description 286
using 113
using output file 278
Edit Authorization List
(EDTAUTL) 154, 283
Edit Document Library Object
Authority (EDTDLOAUT) 287
Edit Library List (EDTLIBL) 193
Edit Object Authority
(EDTOBJAUT) 146, 284
EDTAUTL (Edit Authorization
List) 154, 283
Index
637
command, CL (continued)
EDTDLOAUT (Edit Document Library
Object Authority) 287
EDTLIBL (Edit Library List) 193
EDTOBJAUT (Edit Object
Authority) 146, 284
End Job (ENDJOB)
QINACTMSGQ system value 28
ENDJOB (End Job)
QINACTMSGQ system value 28
Grant Object Authority
(GRTOBJAUT) 284
affect on previous authority 150
multiple objects 149
Grant User Authority (GRTUSRAUT)
copying authority 109
description 286
recommendations 153
renaming profile 115
Grant User Permission
(GRTUSRPMN) 287
GRTOBJAUT (Grant Object
Authority) 284
affect on previous authority 150
multiple objects 149
GRTUSRAUT (Grant User Authority)
copying authority 109
description 286
recommendations 153
renaming profile 115
GRTUSRPMN (Grant User
Permission) 287
keywords, displaying (*CLKWD user
option) 97, 98
object authority, table 284
parameter names, displaying
(*CLKWD user option) 97, 98
passwords, table 285
Print Communications Security
Attributes (PRTCMNSEC)
description 290
Print Job Description Authority
(PRTJOBDAUT) 289
Print Private Authorities
(PRTPVTAUT) 289
Print Publicly Authorized Objects
(PRTPUBAUT) 289
Print Queue Authority (PRTQAUT)
description 289
Print Subsystem Description Authority
(PRTSBSDAUT)
description 289
Print System Security Attributes
(PRTSYSSECA)
description 290
Print Trigger Programs
(PRTTRGPGM)
description 289
Print User Objects (PRTUSROBJ)
description 289
PRTADPOBJ (Print Adopting Objects)
description 603
PRTCMNSEC (Print Communications
Security)
description 290, 603
PRTJOBDAUT (Print Job Description
Authority) 289
638
command, CL (continued)
description 603
PRTPUBAUT (Print Publicly
Authorized Objects) 289
description 603
PRTPVTAUT (Print Private
Authorities) 289
authorization list 603
description 605
PRTQAUT (Print Queue Authority)
description 289, 605
PRTSBSDAUT (Print Subsystem
Description Authority)
description 289
PRTSBSDAUT (Print Subsystem
Description)
description 603
PRTSYSSECA (Print System Security
Attributes)
description 290, 603
PRTTRGPGM (Print Trigger
Programs)
description 289, 603
PRTUSROBJ (Print User Objects)
description 289, 603
PRTUSRPRF (Print User Profile)
description 603
RCLSTG (Reclaim Storage) 20, 25,
130, 244
Reclaim Storage (RCLSTG) 20, 25,
130, 244
Remove Authorization List Entry
(RMVAUTLE) 154, 283
Remove Directory Entry
(RMVDIRE) 288
Remove Document Library Object
Authority (RMVDLOAUT) 287
Remove Library List Entry
(RMVLIBLE) 193
Remove Server Authentication Entry
(RMVSVRAUTE) 288
Restore Authority (RSTAUT)
audit journal (QAUDJRN)
entry 255
description 287
procedure 241
role in restoring security 235
using 240
Restore Document Library Object
(RSTDLO) 235
Restore Library (RSTLIB) 235
Restore Licensed Program
(RSTLICPGM)
recommendations 242
security risks 242
Restore Object (RSTOBJ)
using 235
Restore User Profiles
(RSTUSRPRF) 235, 287
Retrieve Authorization List Entry
(RTVAUTLE) 283
Retrieve User Profile
(RTVUSRPRF) 116, 286
Revoke Object Authority
(RVKOBJAUT) 155, 284
command, CL (continued)
Revoke Public Authority
(RVKPUBAUT)
description 290
Revoke User Permission
(RVKUSRPMN) 287
RMVAUTLE (Remove Authorization
List Entry) 154, 283
RMVDIRE (Remove Directory
Entry) 288
RMVDLOAUT (Remove Document
Library Object Authority) 287
RMVLIBLE (Remove Library List
Entry) 193
RMVSVRAUTE (Remove Server
Authentication Entry) 288
RSTAUT (Restore Authority)
audit journal (QAUDJRN)
entry 255
description 287
procedure 241
role in restoring security 235
using 240
RSTDLO (Restore Document Library
Object) 235
RSTLIB (Restore Library) 235
RSTLICPGM (Restore Licensed
Program)
recommendations 242
security risks 242
RSTOBJ (Restore Object)
using 235
RSTUSRPRF (Restore User
Profiles) 235, 287
RTVAUTLE (Retrieve Authorization
List Entry) 283
RTVUSRPRF (Retrieve User
Profile) 116, 286
RVKOBJAUT (Revoke Object
Authority) 155, 284
RVKPUBAUT (Revoke Public
Authority)
description 290, 607
details 609
RVKUSRPMN (Revoke User
Permission) 287
SAVDLO (Save Document Library
Object) 235
Save Document Library Object
(SAVDLO) 235
Save Library (SAVLIB) 235
Save Object (SAVOBJ) 235, 271
Save Security Data
(SAVSECDTA) 235, 287
Save System (SAVSYS) 235, 287
SAVLIB (Save Library) 235
SAVOBJ (Save Object) 235, 271
SAVSECDTA (Save Security
Data) 235, 287
SAVSYS (Save System) 235, 287
SBMJOB (Submit Job) 186
SECBATCH menu 601
security tools 289, 599
security, list 283
Send Journal Entry (SNDJRNE) 269
Send Network Spooled File
(SNDNETSPLF) 198
command, CL (continued)
Set Attention Program
(SETATNPGM) 94
SETATNPGM (Set Attention
Program) 94
setting QALWUSRDMN (allow user
objects) system value 25
SNDJRNE (Send Journal Entry) 269
SNDNETSPLF (Send Network
Spooled File) 198
Start System/36 (STRS36)
user profile, special
environment 80
STRS36 (Start System/36)
user profile, special
environment 80
Submit Job (SBMJOB) 186
system distribution directory,
table 288
TFRCTL (Transfer Control)
transferring adopted
authority 136
TFRGRPJOB (Transfer to Group Job)
adopted authority 137
Transfer Control (TFRCTL)
transferring adopted
authority 136
Transfer to Group Job (TFRGRPJOB)
adopted authority 137
user profiles (related), table 287
user profiles (working with),
table 286
Work with Authorization Lists
(WRKAUTL) 283
Work with Directory
(WRKDIRE) 288
Work with Journal (WRKJRN) 271,
277
Work with Journal Attributes
(WRKJRNA) 271, 277
Work with Objects (WRKOBJ) 284
Work with Objects by Owner
(WRKOBJOWN)
auditing 250
description 284
using 151
Work with Objects by Primary Group
(WRKOBJPGP) 130, 152
description 284
Work with Output Queue Description
(WRKOUTQD) 197
Work with Spooled Files
(WRKSPLF) 197
Work with System Status
(WRKSYSSTS) 204
Work with System Values
(WRKSYSVAL) 248
Work with User Profiles
(WRKUSRPRF) 104, 286
WRKAUTL (Work with Authorization
Lists) 283
WRKDIRE (Work with
Directory) 288
WRKJRN (Work with Journal) 271,
277
WRKJRNA (Work with Journal
Attributes) 271, 277
command, CL (continued)
WRKOBJ (Work with Objects) 284
WRKOBJOWN (Work with Objects by
Owner)
auditing 250
description 284
using 151
WRKOBJPGP (Work with Objects by
Primary Group) 130, 152
description 284
WRKOUTQD (Work with Output
Queue Description) 197
WRKSPLF (Work with Spooled
Files) 197
WRKSYSSTS (Work with System
Status) 204
WRKSYSVAL (Work with System
Values) 248
WRKUSRPRF (Work with User
Profiles) 104, 286
command, generic
Change Authority (CHGAUT) 147
Change Owner (CHGOWN) 151
Change Primary Group
(CHGPGP) 152
CHGAUT (Change Authority) 147
CHGOWN (Change Owner) 151
CHGPGP (Change Primary
Group) 152
Grant Object Authority
(GRTOBJAUT) 147
GRTOBJAUT (Grant Object
Authority) 147
Revoke Object Authority
(RVKOBJAUT) 147
RVKOBJAUT (Revoke Object
Authority) 147
Work with Authority
(WRKAUT) 147
WRKAUT (Work with
Authority) 147
command, generic object
Change Auditing (CHGAUD) 284
description 287
Change Authority (CHGAUT) 284
Change Owner (CHGOWN) 284
Change Primary Group
(CHGPGP) 284
CHGAUD (Change Auditing) 284
description 287
CHGAUT (Change Authority) 284
CHGOWN (Change Owner) 284
CHGPGP (Change Primary
Group) 284
Display Authority (DSPAUT) 284
DSPAUT (Display Authority) 284
Work with Authority
(WRKAUT) 284
WRKAUT (Work with
Authority) 284
command, integrated file system
Change Auditing (CHGAUD)
using 115
CHGAUD (Change Auditing)
using 115
COMMIT (Commit) command
object authority required 326
commitment control
object authority required for
commands 326
communications
monitoring 252
communications entry
job description 192
communications side information
object authority required for
commands 326
communications side information (*CSI)
auditing 452
comparison
group profile and authorization
list 230
complete change of password 52
complex
authority
example 181
confidential data
protecting 250
confidentiality 1
configuration
automatic
virtual devices (QAUTOVRT
system value) 36
object authority required for
commands 326
configuration list
object authority required for
commands 327
configuration list object auditing 448
Configure System Security (CFGSYSSEC)
command
description 290, 607
connection
ending
audit journal (QAUDJRN)
entry 255
starting
audit journal (QAUDJRN)
entry 255
connection list
object authority required for
commands 328
connection list (*CNNL) auditing 451
connection start and end (VC) file
layout 582
connection start or end (VC) journal entry
type 255
connection verification (CV) file
layout 521
console
authority needed to sign on 189
QCONSOLE system value 189
QSECOFR (security officer) user
profile 189
QSRV (service) user profile 189
QSRVBAS (basic service) user
profile 189
restricting access 248
contents
security tools 289, 599
controller description
object authority required for
commands 328
Index
639
640
creating (continued)
program
adopted authority 137
user profile
audit journal (QAUDJRN)
entry 255
command descriptions 285, 286
example 105
methods 104
creating object
object auditing 444
cross system product map (*CSPMAP)
auditing 452
cross system product table (*CSPTBL)
auditing 452
CRTALRTBL (Create Alert Table)
command
object authority required 320
CRTAUT (create authority) parameter
description 127
displaying 145
risks 128
CRTAUTHLR (Create Authority Holder)
command
authorized IBM-supplied user
profiles 299
considerations 139
description 283, 288
object authority required 322
CRTAUTL (Create Authorization List)
command
description 283
object authority required 323
using 153
CRTBESTMDL (Create BEST/1 Model)
command
authorized IBM-supplied user
profiles 299
CRTBESTMDL (Create Best/1-400 Model)
command
object authority required 405
CRTBNDC (Create Bound C Program)
command
object authority required 376
CRTBNDCBL (Create Bound COBOL
Program) command
object authority required 376
CRTBNDCL
object authority required 376
CRTBNDCPP (Create Bound CPP
Program) command
object authority required 376
CRTBNDDIR (Create Binding Directory)
command
object authority required 323
CRTBNDRPG (Create Bound RPG
Program) command
object authority required 376
CRTBSCF (Create Bisync File) command
object auditing 464
CRTCBLMOD (Create COBOL Module)
command
object authority required 376
CRTCBLPGM (Create COBOL Program)
command
object authority required 376
641
642
Index
643
D
damaged audit journal 269
damaged authorization list
recovering 243
644
data area
object authority required for
commands 331
data authority
definition 120
data queue
object authority required for
commands 332
database share (QDBSHR) user
profile 293
DCEADM (QDCEADM) user profile 293
DCPOBJ (Decompress Object) command
object auditing 445
object authority required 313
DDM (distributed data management)
security 202
DDM request access (DDMACC) network
attribute 202
DDMACC (DDM request access) network
attribute 202
DDMACC (distributed data management
access) network attribute 252
debug functions
adopted authority 137
dedicated service tools (DST)
auditing passwords 248
changing passwords 117
changing user ID 117
resetting password
audit journal (QAUDJRN)
entry 255
command description 285
Dedicated Service Tools (DST)
users 116
default 293
*DFT delivery mode
user profile 92
job description (QDFTJOBD) 86
object
auditing 265
owner (QDFTOWN) user profile
audit journal (QAUDJRN)
entry 255
default values 293
description 130
restoring programs 242
sign-on
audit journal (QAUDJRN)
entry 255
security level 40 16
subsystem description 191
value
IBM-supplied user profile 291
user profile 291
delete (*DELETE) audit level 255
delete (*DLT) authority 120, 309
Delete Authority Holder (DLTAUTHLR)
command 140, 283, 288
Delete Authorization List (DLTAUTL)
command 155, 283
Delete Journal Receiver (DLTJRNRCV)
command 272
delete operation (DO) file layout 528
delete operation (DO) journal entry
type 255
645
displaying (continued)
QAUDCTL (audit control) system
value 289, 601
QAUDLVL (audit level) system
value 289, 601
security auditing 289, 601
sign-on information
DSPSGNINF user profile
parameter 82
QDSPSGNINF system value 26
recommendations 82
spooled file 198
user profile
activation schedule 599
active profile list 599
command description 286
expiration schedule 599
individual 113
summary list 113
distributed data management access
(DDMACC) network attribute 252
distributed systems node executive
(QDSNX) user profile 293
distribution
object authority required for
commands 336
distribution directory
changing
audit journal (QAUDJRN)
entry 255
distribution directory, system
commands for working with 288
distribution list
deleting user profile 110
object authority required for
commands 336
DLCOBJ (Deallocate Object) command
object auditing 445
object authority required 313
DLO (document library object)
authority
command descriptions 287
DLTALR (Delete Alert) command
object authority required 320
DLTALRTBL (Delete Alert Table)
command
object authority required 320
DLTAPARDTA (Delete APAR Data)
command
authorized IBM-supplied user
profiles 299
object authority required 423
DLTAUTHLR (Delete Authority Holder)
command
description 283, 288
object authority required 322
using 140
DLTAUTL (Delete Authorization List)
command
description 283
object authority required 323
using 155
DLTBESTMDL (Delete BEST/1 Model)
command
authorized IBM-supplied user
profiles 299
646
Index
647
648
649
650
E
Edit Authorization List (EDTAUTL)
command 154, 283
Edit Authorization List display
displaying detail (*EXPERT user
option) 97, 98
edit description
object authority required for
commands 341
Edit Document Library Object Authority
(EDTDLOAUT) command 287
Edit Library List (EDTLIBL)
command 193
Edit Object Authority (EDTOBJAUT)
command 146, 284
Edit Object Authority display
displaying detail (*EXPERT user
option) 97, 98
editing
authorization list 154, 283
document library object (DLO)
authority 287
library list 193
object authority 146, 284
EDTAUTL (Edit Authorization List)
command
description 283
object auditing 447
object authority required 323
using 154
651
652
example (continued)
password validation exit program 55
password validation program 54
public authority
creating new objects 127
restricting save and restore
commands 203
RSTLICPGM (Restore Licensed
Program) command 242
securing output queues 200
exceeding
account limit
audit journal (QAUDJRN)
entry 255
exclude (*EXCLUDE) authority 121
execute (*EXECUTE) authority 120, 309
existence (*OBJEXIST) authority 120, 309
exit 55
exit points
user profile 116
expert (*EXPERT) user option 97, 98,
147
expiration
password (QPWDEXPITV system
value) 46
user profile
displaying schedule 599
setting schedule 599
EXPPART (Export Part) command
object authority required 321
extended wireless LAN configuration
object authority required for
commands 341
EXTPGMINF (Extract Program
Information) command
object authority required 412
F
faccessx (Determine file accessibility for a
class of users by descriptor) command
object auditing 454
faccessx (Determine File Accessibility)
command
object auditing 495
failure
authority failure
audit journal (QAUDJRN)
entry 255
sign-on
*ALLOBJ (all object) special
authority 187
*SERVICE (service) special
authority 187
QSECOFR (security officer) user
profile 187
field authorities 123
field authority
definition 120
field-level security 224
FILDOC (File Document) command
object auditing 460
object authority required 337
file
journaling
security tool 224
file (continued)
object authority required for
commands 342
planning security 224
program-described
holding authority when
deleted 139
securing
critical 224
fields 224
records 224
source
securing 232
file (*FILE) object auditing 464
file layout 506
file security
SQL 227
file transfer
securing 202
filter
object authority required for
commands 349
filter (*FTR) object auditing 468
finance
object authority required for
commands 350
finance (QFNC) user profile 293
flowchart
authority checking 156
determining special environment 80
device description authority 187
FNDSTRPDM (Find String Using PDM)
command
object authority required 321
folder
security shared 202
font resource (*FNTRSC) object
auditing 467
force conversion on restore
(QFRCCVNRST)
system value 42
force level
audit records 60
form definition (*FORMDF) object
auditing 468
forms control table
object authority required for
commands 419
FTP (File Transfer Protocol) command
object authority required 434
full
audit (QAUDJRN) journal
receiver 270
full-screen help (*HLPFULL) user
option 98
G
GENCAT (Merge Message Catalogue)
command
object authority required 342
GENCPHK (Generate Cipher Key)
command
authorized IBM-supplied user
profiles 299
object authority required 330
Index
653
graphical operations
object authority required for
commands 350
graphics symbol set
object authority required for
commands 351
group
authority
displaying 142
primary
introduction 5
group (*GROUP) authority 142
group authority
adopted authority 136
authority checking example 173, 177
description 119
GRPAUT user profile parameter 88,
129, 131
GRPAUTTYP user profile
parameter 89, 131
group authority type
GRPAUTTYP user profile
parameter 89
group identification number (gid))
restoring 238
group job
adopted authority 137
group profile
auditing
*ALLOBJ special authority 250
membership 250
password 249
authorization list
comparison 230
comparison
authorization list 230
GRPPRF user profile parameter
changes when restoring
profile 237
description 87
introduction 5, 63
multiple
planning 229
naming 66
object ownership 129
password 66
planning 229
primary 130
planning 229
resource security 5, 119
supplemental
SUPGRPPRF (supplemental
groups) parameter 89
user profile
description 87
user profile parameter
changes when restoring
profile 237
GRPAUT (group authority) parameter
user profile 88, 129, 131
GRPAUTTYP (group authority type)
parameter
user profile 89, 131
GRPPRF (group profile) parameter
user profile
description 87
example 131
654
H
hardware
enhanced storage protection 16
object authority required for
commands 418
help full screen (*HLPFULL) user
option 98
help information
displaying full screen (*HLPFULL
user option) 98
history (QHST) log
using to monitor security 276
HLDCMNDEV (Hold Communications
Device) command
authorized IBM-supplied user
profiles 299
object auditing 454
object authority required 332
HLDDSTQ (Hold Distribution Queue)
command
authorized IBM-supplied user
profiles 299
object authority required 336
HLDJOB (Hold Job) command
object authority required 368
HLDJOBQ (Hold Job Queue) command
object auditing 470
object authority required 372
HLDJOBSCDE (Hold Job Schedule Entry)
command
object auditing 471
object authority required 372
I
IBM-supplied objects
securing with authorization list 127
IBM-Supplied Service Tools User ID Reset
(DS) file layout 530
IBM-supplied user profile
ADSM (QADSM) 293
AFDFTUSR (QAFDFTUSR) 293
AFOWN (QAFOWN) 293
AFUSR (QAFUSR) 293
auditing 248
authority profile (QAUTPROF) 293
automatic install (QLPAUTO) 293
basic service (QSRVBAS) 293
BRM (QBRMS) 293
BRM user profile (QBRMS) 293
changing password 117
database share (QDBSHR) 293
DCEADM (QDCEADM) 293
default owner (QDFTOWN)
default values 293
description 130
default values table 291
distributed systems node executive
(QDSNX) 293
document (QDOC) 293
finance (QFNC) 293
IBM authority profile
(QAUTPROF) 293
install licensed programs
(QLPINSTALL) 293
mail server framework (QMSF) 293
NFS user profile (QNFSANON) 293
programmer (QPGMR) 293
purpose 116
QADSM (ADSM) 293
QAFDFTUSR (AFDFTUSR) 293
QAFOWN (AFOWN) 293
QAFUSR (AFUSR) 293
QAUTPROF (database share) 293
QAUTPROF (IBM authority
profile) 293
QBRMS (BRM user profile) 293
QBRMS (BRM) 293
655
J
JD (job description change) file
layout 538
JD (job description change) journal entry
type 255
JKL Toy Company
diagram of applications 207
job
*JOBCTL (job control) special
authority 76
automatic cancelation 38, 39
changing
adopted authority 137
audit journal (QAUDJRN)
entry 255
disconnected job interval
(QDSCJOBITV) system value 38
inactive
time-out interval (QINACTITV)
system value 27
object authority required for
commands 368
restricting to batch 205
scheduling 204
security when starting 185
verify object on restore
(QVFYOBJRST) system value 39
job accounting
user profile 90
job action (JOBACN) network
attribute 200, 252
job change (*JOBDTA) audit level 255
job change (JS) file layout 539
job change (JS) journal entry type 255
job control (*JOBCTL) special authority
functions allowed 76
output queue parameters 198
priority limit (PTYLMT) 85
risks 77
job description
audit journal (QAUDJRN) entry 255
changing
audit journal (QAUDJRN)
entry 255
communications entry 192
default (QDFTJOBD) 86
displaying 251
monitoring 251
object authority required for
commands 371
printing security-relevant
parameters 603
protecting 16
protecting system resources 204
QDFTJOBD (default) 86
recommendations 87
restoring
audit journal (QAUDJRN)
entry 255
security issues 192
security level 40 16
USER parameter 192
user profile 86
workstation entry 192
job description (*JOBD) object
auditing 470
656
journaling
security tool 224
JRNAP (Journal Access Path) command
object authority required 373
JRNAP (Start Journal Access Path)
command
object auditing 472
JRNOBJ (Journal Object) command
object authority required 373
JRNPF (Journal Physical File) command
object authority required 373
JRNPF (Start Journal Physical File)
command
object auditing 472
JS (job change) file layout 539
JS (job change) journal entry type 255
K
kerberos authentication (X0) file
layout 589
keyboard buffering
KBDBUF user profile parameter 83
QKBDBUF system value 84
keylock security 2
keylock switch
auditing 248
KF (key ring file) file layout 542
L
LAN Server
special authorities 79
LAN Server/400 79
LANGID (language identifier) parameter
SRTSEQ user profile parameter 95
user profile 96
language identifier
LANGID user profile parameter 96
QLANGID system value 96
SRTSEQ user profile parameter 95
language, programming
object authority required for
commands 376
large profiles
planning applications 214
large user profile 278
LD (link, unlink, search directory) file
layout 544
length of password 48, 49
level 10
QSECURITY (security level) system
value 12
level 20
QSECURITY (security level) system
value 12
level 30
QSECURITY (security level) system
value 13
level 40
internal control blocks 20
QSECURITY (security level) system
value 14
level 50
internal control blocks 20
message handling 20
level 50 (continued)
QSECURITY (security level) system
value 19
QTEMP (temporary) library 20
validating parameters 17
level of security (QSECURITY) system
value
comparison of levels 9
level 20 12
level 30 13
level 40 14
level 50 19
overview 9
recommendations 11
special authority 11
user class 11
library
authority
definition 5
description 123
new objects 127
AUTOCFG (automatic device
configuration) value 36
automatic device configuration
(AUTOCFG) value 36
create authority (CRTAUT) parameter
description 127
example 131
risks 128
specifying 144
create object auditing (CRTOBJAUD)
value 61
creating 144
CRTAUT (create authority) parameter
description 127
example 131
risks 128
specifying 144
CRTOBJAUD (create object auditing)
value 61
current 71
designing 213
listing
all libraries 279
contents 279
object authority required for
commands 383
object ownership 232
planning 213
printing list of subsystem
descriptions 289
public authority
specifying 144
QRETSVRSEC (retain server security)
value 32
QTEMP (temporary)
security level 50 20
restoring 235
retain server security (QRETSVRSEC)
value 32
saving 235
security
adopted authority 123
description 123
designing 213
example 213
guidelines 214
library (continued)
security (continued)
risks 123
library (*LIB) auditing 473
library list
adding entries 193, 196
adopted authority 123
changing 193
current library
description 193
recommendations 196
user profile 71
definition 193
editing 193
job description (JOBD)
user profile 86
monitoring 251
product library
description 193
recommendations 195
recommendations 195
removing entries 193
security risks 193, 194
system portion
changing 216
description 193
recommendations 195
user portion
controlling 215
description 193
recommendations 196
licensed program
automatic install (QLPAUTO) user
profile
description 293
install (QLPINSTALL) user profile
default values 293
object authority required for
commands 386
restoring
recommendations 242
security risks 242
licensed program automatic install
(QLPAUTO) user profile
restoring 238
licensed program install (QLPINSTALL)
user profile
restoring 238
limit capabilities (LMTCPB) parameter
user profile 73
limit characters (QPWDLMTCHR) system
value 50
limit repeated characters
(QPWDLMTREP) system value 51
limit security officer (QLMTSECOFR)
system value
value set by CFGSYSSEC
command 607
limiting
capabilities 73
changing Attention-key-handling
program 95
changing current library 72, 196
changing initial menu 73
changing initial program 72
commands allowed 74
functions allowed 74
limiting (continued)
capabilities (continued)
listing users 278
LMTCPB user profile
parameter 73
command line use 73
device sessions
auditing 250
LMTDEVSSN user profile
parameter 83
recommendations 83
device sessions (QLMTDEVSSN)
system value
description 29
disk usage (MAXSTG) 84
security officer (QLMTSECOFR)
changing security levels 13
security officer (QLMTSECOFR)
system value
auditing 248
authority to device
descriptions 187
description 29
sign-on process 189
sign-on
attempts (QMAXSGNACN) system
value 31
attempts (QMAXSIGN) system
value 30
multiple devices 29
sign-on attempts
auditing 248, 252
use of system resources
priority limit (PTYLMT)
parameter 85
line description
object authority required for
commands 387
line description (*LIND) auditing 474
link
object authority required for
commands 351
listing
all libraries 279
authority holders 139
library contents 279
selected user profiles 278
system values 248
user profile
individual 113
summary list 113
Lists, Create Validation 232
Lists, Delete Validation 232
LMTDEVSSN (limit device sessions)
parameter
user profile 83
LNKDTADFN (Link Data Definition)
command
object auditing 462
object authority required 367
local socket (*SOCKET) auditing 489
locale
object authority required for
commands 389
LOCALE (user options) parameter
user profile 98
Index
657
M
mail
handling
audit journal (QAUDJRN)
entry 255
mail actions (ML) file layout 545
mail actions (ML) journal entry type 255
mail server framework
object authority required for
commands 389
mail server framework (QMSF) user
profile 293
mail services
action auditing 475
management (*OBJMGT) authority
object 120, 309
managing
audit journal 269
maximum
auditing 248
length of password (QPWDMAXLEN
system value) 49
sign-on attempts (QMAXSIGN)
system value 248
description 30
size
audit (QAUDJRN) journal
receiver 270
storage (MAXSTG) parameter
authority holder 130
group ownership of objects 129
journal receiver 84
restore operation 84
user profile 84
maximum sign-on attempts
(QMAXSIGN) system value
value set by CFGSYSSEC
command 607
658
mode description
object authority required for
commands 394
mode description (*MODD)
auditing 476
mode of access
definition 120
module
binding directory 394
object authority required for
commands 394
module (*MODULE) auditing 476
monitoring
*ALLOBJ (all object) special
authority 250
adopted authority 251
authority
user profiles 250
authorization 250
checklist for 247
communications 252
encryption of sensitive data 252
group profile
membership 250
password 249
IBM-supplied user profiles 248
inactive users 250
job descriptions 251
library lists 251
limit capabilities 250
message
security 276
methods 275
network attributes 252
object authority 279
object integrity 280
overview 247
password controls 249
physical security 248
program failure 279
programmer authorities 250
remote sign-on 252
security officer 280
sensitive data
authority 250
encrypting 252
sign-on without user ID and
password 251
system values 248
unauthorized access 251
unauthorized programs 252
unsupported interfaces 252
user profile
administration 250
using
journals 276
QHST (history) log 276
QSYSMSG message queue 252
MOUNT (Add Mounted File System)
command
object authority required 439
MOUNT (Add Mounted File System)
command) command
object authority required 396
MOV
object authority required 351
N
NA (network attribute change) file
layout 546
NA (network attribute change) journal
entry type 255
naming
audit journal receiver 268
group profile 65, 66
user profile 65
national language version (NLV)
command security 224
ND (APPN directory) file layout 546
NE (APPN end point) file layout 547
netBIOS description
object authority required for
commands 395
NetBIOS description (*NTBD)
auditing 479
NETSTAT (Network Status) command
object authority required 434
network
logging off
audit journal (QAUDJRN)
entry 255
logging on
audit journal (QAUDJRN)
entry 255
password
audit journal (QAUDJRN)
entry 255
network attribute
*SECADM (security administrator)
special authority 76
changing
audit journal (QAUDJRN)
entry 255
command 200
659
O
OBJAUD (object auditing) parameter
user profile 101
object
(*Mgt) authority 120
(*Ref) authority 120
add (*ADD) authority 120, 309
altered
checking 280
assigning authority and
ownership 131
auditing
changing 78
default 265
authority
*ALL (all) 121, 310
*CHANGE (change) 121, 310
*USE (use) 121, 310
changing 146
commonly used subsets 121
new 128
new object 127
storing 237
system-defined subsets 121
using referenced 153
authority required for
commands 313
controlling access 15
default owner (QDFTOWN) user
profile 130
delete (*DLT) authority 120, 309
displaying
originator 130
domain attribute 15
execute (*EXECUTE) authority 120,
309
existence (*OBJEXIST) authority 120,
309
failure of unsupported interface 15
660
object (continued)
management (*OBJMGT)
authority 120, 309
non-IBM
printing list 289
operational (*OBJOPR) authority 120,
309
ownership
introduction 5
primary group 109, 130
printing
adopted authority 603
authority source 603
non-IBM 603
read (*READ) authority 120, 309
restoring 235, 238
saving 235
securing with authorization list 155
state attribute 15
storing
authority 236, 237
update (*UPD) authority 120, 309
user domain
restricting 19
security exposure 19
working with 284
object alter (*OBJALTER) authority 120,
309
object auditing
*ALRTBL (alert table) object 446
*AUTHLR (authority holder)
object 447
*AUTL (authorization list) object 446
*BNDDIR (binding directory)
object 447
*CFGL (configuration list) object 448
*CHTFMT (chart format) object 448
*CLD (C locale description)
object 450
*CLS (Class) object 450
*CMD (Command) object 450
*CNNL (connection list) object 451
*COSD (class-of-service description)
object 451
*CRQD (change request description)
object 449
*CSI (communications side
information) object 452
*CSPMAP (cross system product map)
object 452
*CSPTBL (cross system product table)
object 452
*CTLD (controller description)
object 452
*DEVD (device description)
object 453
*DIR (directory) object 454
*DOC (document) object 458
*DTAARA (data area) object 462
*DTADCT (data dictionary)
object 462
*DTAQ (data queue) object 462
*EDTD (edit description) object 463
*EXITRG (exit registration) object 463
*FCT (forms control table) object 464
*FILE (file) object 464
*FLR (folder) object 458
661
662
output
object authority required for
commands 427
output file (OUTPUT(*OUTFILE))
object authority required 311
output priority 204
output queue
*JOBCTL (job control) special
authority 76
*OPRCTL (operator control)
parameter 76, 77
*SPLCTL (spool control) special
authority 77
AUTCHK (authority to check)
parameter 198
authority to check (AUTCHK)
parameter 198
changing 197
creating 197, 200
display data (DSPDTA)
parameter 198
DSPDTA (display data)
parameter 198
object authority required for
commands 404
operator control (OPRCTL)
parameter 198
OPRCTL (operator control)
parameter 198
printing security-relevant
parameters 289, 605
securing 197, 200
user profile 93
working with description 197
output queue (*OUTQ) auditing 480
output queue (OUTQ) parameter
user profile 93
OUTQ (output queue) parameter
user profile 93
overlay (*OVL) auditing 481
Override commands 227
OVRMSGF (Override with Message File)
command
object auditing 477
OW (ownership change) file layout 553
OW (ownership change) journal entry
type 255
owner
See also ownership
OWNER user profile parameter
description 129
OWNER (owner) parameter
user profile 131
owner authority
flowchart 162
ownership
adopted authority 137
ALWOBJDIF (allow object differences)
parameter 239
assigning to new object 131
change when restoring
audit journal (QAUDJRN)
entry 255
changes when restoring 239
changing
audit journal (QAUDJRN)
entry 255
ownership (continued)
changing (continued)
authority required 129
methods 151
default (QDFTOWN) user profile 130
deleting
owner profile 109, 129
description 128
device description 189
flowchart 162
group profile 129
introduction 5
managing
owner profile size 129
new object 131
object
managing 232
private authority 119
OWNER user profile parameter
description 88
printer output 197
restoring 235, 239
saving 235
spooled file 197
working with 151
workstation 189
ownership change (OW) file layout 553
ownership change (OW) journal entry
type 255
ownership change for restored object
(RO) file layout 565
ownership change for restored object
(RO) journal entry type 255
ownership, object
responsibilities 250
P
PA (program adopt) file layout 556
PA (program adopt) journal entry
type 255
package
object authority required for
commands 405
PAGDOC (Paginate Document) command
object auditing 460
object authority required 337
page definition (*PAGDFN) auditing 482
page down key
reversing (*ROLLKEY user
option) 98
page segment (*PAGSEG) auditing 482
page up key
reversing (*ROLLKEY user
option) 98
panel group
object authority required for
commands 391
panel group (*PNLGRP) auditing 484
parameter
validating 17
partial (*PARTIAL) limit capabilities 74
pass-through
controlling sign-on 32
target profile change
audit journal (QAUDJRN)
entry 255
password
all-numeric 66
allowing users to change 249
approval program
example 54, 55
QPWDVLDPGM system value 53
requirements 53
security risk 54
auditing
DST (dedicated service tools) 248
user 249
changes when restoring profile 237
changing
description 285
DST (dedicated service tools) 285
enforcing password system
values 45
setting password equal to profile
name 67
checking 116, 285
checking for default 599
commands for working with 285
communications 49
document
DOCPWD user profile
parameter 91
DST (dedicated service tools)
auditing 248
changing 117
encrypting 67
equal to user profile name 45, 67
expiration interval
auditing 249
PWDEXPITV user profile
parameter 82
QPWDEXPITV system value 46
expiration interval (QPWDEXPITV)
system value
value set by CFGSYSSEC
command 607
expired (PWDEXP) parameter 68
IBM-supplied user profile
auditing 248
changing 117
immediate expiration 46
incorrect
audit journal (QAUDJRN)
entry 255
length
maximum (QPWDMAXLEN)
system value 49
minimum (QPWDMINLEN)
system value 48
limit repeated characters
(QPWDLMTREP) system value
value set by CFGSYSSEC
command 607
lost 67
maximum length (QPWDMAXLEN
system value) 49
maximum length (QPWDMAXLEN)
system value
value set by CFGSYSSEC
command 607
minimum length (QPWDMINLEN
system value) 48
Index
663
password (continued)
minimum length (QPWDMINLEN)
system value
value set by CFGSYSSEC
command 607
network
audit journal (QAUDJRN)
entry 255
position characters (QPWDPOSDIF)
system value 52
possible values 67
preventing
adjacent digits (QPWDLMTAJC
system value) 51
repeated characters 51
trivial 45, 249
use of words 50
PWDEXP (set password to
expired) 68
QPGMR (programmer) user
profile 609
QSRV (service) user profile 609
QSRVBAS (basic service) user
profile 609
QSYSOPR (system operator) user
profile 609
QUSER (user) user profile 609
recommendations 67, 68
require numeric character
(QPWDRQDDGT) system value
value set by CFGSYSSEC
command 607
require position difference
(QPWDPOSDIF) system value
value set by CFGSYSSEC
command 607
required difference (QPWDRQDDIF)
system value
value set by CFGSYSSEC
command 607
requiring
change (PWDEXPITV
parameter) 82
change (QPWDEXPITV system
value) 46
complete change 52
different (QPWDRQDDIF system
value) 49
numeric character 52
resetting
DST (dedicated service tools) 255
user 67
restrict adjacent characters
(QPWDLMTAJC) system value
value set by CFGSYSSEC
command 607
restrict characters (QPWDLMTCHR)
system value
value set by CFGSYSSEC
command 607
restricting
adjacent digits (QPWDLMTAJC
system value) 51
characters 50
repeated characters 51
rules 67
setting to expired (PWDEXP) 68
664
password (continued)
system 118
system values
overview 44
trivial
preventing 45, 249
user profile 66
validation exit program
example 55
validation program
example 54
QPWDVLDPGM system value 53
requirements 53
security risk 54
validation program (QPWDVLDPGM)
system value
value set by CFGSYSSEC
command 607
password (PW) journal entry type 255
password expiration interval
(PWDEXPITV)
recommendations 83
password expiration interval
(QPWDEXPITV) system value
auditing 249
Password Level (QPWDLVL)
description 46
Password Level (QPWDLVL) system
value
description 46
password required difference
(QPWDRQDDIF) system value
value set by CFGSYSSEC
command 607
password validation program
(QPWDVLDPGM) system value 53
passwords
password levels 278
Passwords 46
path name
displaying 152
PC (personal computer)
preventing access 201
PC Organizer
allowing for limit capabilities user 74
disconnecting (QINACTMSGQ system
value) 28
PC Support access (PCSACC) network
attribute 252
PC text-assist function (PCTA)
disconnecting (QINACTMSGQ system
value) 28
PCSACC (client request access) network
attribute 201
PCSACC (PC Support access) network
attribute 252
PDM (programming development
manager)
object authority for commands 321
performance
class 204
job description 204
job scheduling 204
object authority required for
commands 405
output priority 204
pool 204
performance (continued)
priority limit 204
restricting jobs to batch 205
routing entry 204
run priority 204
storage
pool 204
subsystem description 204
time slice 204
performance tuning
security 204
permission
definition 122
PG (primary group change) file
layout 558
PG (primary group change) journal entry
type 255
physical security 2
auditing 248
planning 248
PING (Verify TCP/IP Connection)
command
object authority required 434
PKGPRDDST (Package Product
Distribution) command
authorized IBM-supplied user
profiles 299
planning
application programmer security 231
audit
system values 265
auditing
actions 253
objects 263
overview 253
checklist for 247
command security 223
file security 224
group profiles 229
library design 213
menu security 217
multiple groups 229
password controls 249
physical security 248
primary group 229
security 1
system programmer security 232
planning password level changes
changing assword levels (0 to 1) 209
changing assword levels (0 to 2) 210
changing assword levels (1 to 2) 210
changing assword levels (2 to 3) 212
changing password level from 1to
0 213
changing password level from 2 to
1 212
changing password level from 2to
0 213
changing password level from 3 to
0 212
changing password level from 3 to
1 212
changing password level from 3 to
2 212
changing password levels
planning level changes 209, 210
decreasing password levels 212, 213
printing (continued)
security-relevant communications
settings 603
security-relevant job queue
parameters 289, 605
security-relevant output queue
parameters 289, 605
security-relevant subsystem
description values 603
sending message (*PRTMSG user
option) 98
system values 248, 290, 603
trigger programs 289, 603
printing message (*PRTMSG) user
option 98
priority 204
priority limit (PTYLMT) parameter
recommendations 86
user profile 85
private authorities
authority cache 184
private authority
definition 119
flowchart 161
object ownership 119
planning applications 214
restoring 235, 240
saving 235
privilege
definition 119
problem
object authority required for
commands 411
problem analysis
remote service attribute
(QRMTSRVATR) system value 38
processor keylock 248
processor password 118
product availability (*PRDAVL)
auditing 484
product definition (*PRDDFN)
auditing 484
product library
library list 195
description 193
recommendations 195
product load (*PRDLOD) auditing 484
profile
action auditing (AUDLVL) 102
analyzing with query 277
auditing
*ALLOBJ special authority 250
authority to use 250
auditing membership 250
auditing password 249
AUDLVL (action auditing) 102
changing 286
default values table 291
group 250
See also group profile
auditing 250
introduction 5, 63
naming 66
object ownership 129
password 66
planning 229
resource security 5
Index
665
profile (continued)
handle
audit journal (QAUDJRN)
entry 255
IBM-supplied
auditing 248
authority profile
(QAUTPROF) 293
automatic install (QLPAUTO) 293
basic service (QSRVBAS) 293
BRM user profile (QBRMS) 293
database share (QDBSHR) 293
default owner (QDFTOWN) 293
distributed systems node executive
(QDSNX) 293
document (QDOC) 293
finance (QFNC) 293
IBM authority profile
(QAUTPROF) 293
install licensed programs
(QLPINSTALL) 293
mail server framework
(QMSF) 293
network file system (QNFS) 293
programmer (QPGMR) 293
QAUTPROF (IBM authority
profile) 293
QBRMS (BRM user profile) 293
QDBSHR (database share) 293
QDFTOWN (default owner) 293
QDOC (document) 293
QDSNX (distributed systems node
executive) 293
QFNC (finance) 293
QGATE (VM/MVS bridge) 293
QLPAUTO (licensed program
automatic install) 293
QLPINSTALL (licensed program
install) 293
QMSF (mail server
framework) 293
QNFSANON (network file
system) 293
QPGMR (programmer) 293
QRJE (remote job entry) 293
QSECOFR (security officer) 293
QSNADS (Systems Network
Architecture distribution
services) 293
QSPL (spool) 293
QSPLJOB (spool job) 293
QSRV (service) 293
QSRVBAS (service basic) 293
QSYS (system) 293
QSYSOPR (system operator) 293
QTCP (TCP/IP) 293
QTMPLPD (TCP/IP printing
support) 293
QTSTRQS (test request) 293
QUSER (workstation user) 293
remote job entry (QRJE) 293
restricted commands 299
security officer (QSECOFR) 293
service (QSRV) 293
service basic (QSRVBAS) 293
SNA distribution services
(QSNADS) 293
666
profile (continued)
IBM-supplied (continued)
spool (QSPL) 293
spool job (QSPLJOB) 293
system (QSYS) 293
system operator (QSYSOPR) 293
TCP/IP (QTCP) 293
TCP/IP printing support
(QTMPLPD) 293
test request (QTSTRQS) 293
VM/MVS bridge (QGATE) 293
workstation user (QUSER) 293
OBJAUD (object auditing) 101
object auditing (OBJAUD) 101
QDFTOWN (default owner)
restoring programs 242
swap
audit journal (QAUDJRN)
entry 255
user 101, 102, 277
accounting code (ACGCDE) 90
ACGCDE (accounting code) 90
assistance level (ASTLVL) 70
ASTLVL (assistance level) 70
ATNPGM (Attention-key-handling
program) 94
Attention-key-handling program
(ATNPGM) 94
auditing 250
authority (AUT) 100
automatic creation 63
CCSID (coded character set
identifier) 96
changing 109
CHRIDCTL (user options) 97
CNTRYID (country or region
identifier) 96
coded character set identifier
(CCSID) 96
country or region identifier
(CNTRYID) 96
CURLIB (current library) 71
current library (CURLIB) 71
delivery (DLVRY) 92
description (TEXT) 75
DEV (print device) 93
display sign-on information
(DSPSGNINF) 82
DLVRY (message queue
delivery) 92
DOCPWD (document
password) 91
document password
(DOCPWD) 91
DSPSGNINF (display sign-on
information) 82
group (GRPPRF) 87
group authority (GRPAUT) 88,
129
group authority type
(GRPAUTTYP) 89
group identification number(gid
) 99
GRPAUT (group authority) 88,
129
GRPAUTTYP (group authority
type) 89
profile (continued)
user (continued)
GRPPRF (group) 87
home directory (HOMEDIR) 100
IBM-supplied 116
initial menu (INLMNU) 73
initial program (INLPGM) 72
INLMNU (initial menu) 73
INLPGM (initial program) 72
introduction 4
job description (JOBD) 86
JOBD (job description) 86
KBDBUF (keyboard buffering) 83
keyboard buffering (KBDBUF) 83
LANGID (language identifier) 96
language identifier (LANGID) 96
large, examining 278
limit capabilities 73, 250
limit device sessions
(LMTDEVSSN) 83
listing inactive 278
listing selected 278
listing users with command
capability 278
listing users with special
authorities 278
LMTCPB (limit capabilities) 73
LMTDEVSSN (limit device
sessions) 83
LOCALE (user options) 98
maximum storage (MAXSTG) 84
MAXSTG (maximum storage) 84
message queue (MSGQ) 91
message queue delivery
(DLVRY) 92
message queue severity (SEV) 92
MSGQ (message queue) 91
name (USRPRF) 65
naming 65
output queue (OUTQ) 93
OUTQ (output queue) 93
owner of objects created
(OWNER) 88, 129
password 66
password expiration interval
(PWDEXPITV) 82
print device (DEV) 93
priority limit (PTYLMT) 85
PTYLMT (priority limit) 85
public authority (AUT) 100
PWDEXP (set password to
expired) 68
PWDEXPITV (password expiration
interval) 82
renaming 114
retrieving 116
roles 63
set password to expired
(PWDEXP) 68
SETJOBATR (user options) 97
SEV (message queue severity) 92
severity (SEV) 92
sort sequence (SRTSEQ) 95
SPCAUT (special authority) 75
SPCENV (special
environment) 80
special authority (SPCAUT) 75
profile (continued)
user (continued)
special environment
(SPCENV) 80
SRTSEQ (sort sequence) 95
status (STATUS) 69
SUPGRPPRF (supplemental
groups) 89
supplemental groups
(SUPGRPPRF) 89
System/36 environment 80
text (TEXT) 75
user class (USRCLS) 69
user identification number( ) 99
user options (CHRIDCTL) 97
user options (LOCALE) 98
user options (SETJOBATR) 97
user options (USROPT) 97, 98
USRCLS (user class) 69
USROPT (user options) 97, 98
USRPRF (name) 65
profile swap (PS) file layout 561
profile swap (PS) journal entry type 255
program
adopt authority function
auditing 279
adopted authority
audit journal (QAUDJRN)
entry 255
auditing 251
creating 137
displaying 138
ignoring 139
purpose 135
restoring 242
transferring 136
bound
adopted authority 138
changing
specifying USEADPAUT
parameter 139
creating
adopted authority 137
displaying
adopted authority 138
ignoring
adopted authority 139
object authority required for
commands 412
password validation
example 54
QPWDVLDPGM system value 53
requirements 53
password validation exit
example 55
preventing
unauthorized 252
program failure
audit journal (QAUDJRN)
entry 255
restoring
adopted authority 242
risks 241
validation value 17
service
adopted authority 138
program (continued)
transferring
adopted authority 136
translation 17
trigger
listing all 289
unauthorized 252
working with user profiles 116
program (*PGM) auditing 482
program adopt (PA) file layout 556
program adopt (PA) journal entry
type 255
program adopt function
See adopted authority
program failure
auditing 279
restoring programs
audit journal (QAUDJRN)
entry 255
program failure (*PGMFAIL) audit
level 255
program state
definition 16
displaying 16
program temporary fix (PTF)
object authority required for
commands 423
program validation
definition 17
program-described file
holding authority when deleted 139
programmer
application
planning security 231
auditing access to production
libraries 250
system
planning security 232
programmer (QPGMR) user profile
default values 293
device description owner 189
programming development manager
(PDM)
object authority for commands 321
programming language
object authority required for
commands 376
programs that adopt
displaying 279
protecting
backup media 248
protection
enhanced hardware storage 16
PRTACTRPT (Print Activity Report)
command
object authority required 405
PRTADPOBJ (Print Adopted Object)
command
object authority required 436
PRTADPOBJ (Print Adopting Object)
command
authorized IBM-supplied user
profiles 299
PRTADPOBJ (Print Adopting Objects)
command
description 603
Index
667
668
Q
QADSM (ADSM) user profile 293
QAFDFTUSR (AFDFTUSR) user
profile 293
QAFOWN (AFOWN) user profile 293
QAFUSR (AFUSR) user profile 293
QALWOBJRST (allow object restore
option) system value 43
669
670
671
672
query
analyzing audit journal entries 274
query definition (*QRYDFN)
auditing 486
Query Management/400
object authority required for
commands 415
query manager form (*QMFORM)
auditing 485
query manager query (*QMQRY)
auditing 485
question and answer
object authority required for
commands 416
QUSEADPAUT (use adopted authority)
system value
description 34
risk of changing 35
QUSER (user) user profile
password set by CFGSYSSEC
command 609
QUSER (workstation user) user
profile 293
QUSER38 library 125
QUSRLIBL (user library list) system
value 87
QUSRTOOL library
Display Audit Log (DSPAUDLOG)
messages used 255
DSPAUDLOG (Display Audit Log)
messages used 255
QVFYOBJRST (verify object on restore)
system value 39
QVFYOBJRST (Verify Object Restore)
system value 3
QWCLSCDE (List job schedule entry) API
object auditing 471
R
RA (authority change for restored object)
journal entry type 255
RCLACTGRP (Reclaim Activation Group)
command
object authority required 430
RCLDLO (Reclaim Document Library
Object) command
object auditing 461
object authority required 337
RCLOPT (Reclaim Optical) command
authorized IBM-supplied user
profiles 299
object authority required 401
RCLRSC (Reclaim Resources) command
object authority required 430
RCLSPLSTG (Reclaim Spool Storage)
command
authorized IBM-supplied user
profiles 299
object authority required 427
RCLSTG (Reclaim Storage) command
authorized IBM-supplied user
profiles 299
damaged authorization list 244
object auditing 444
object authority required 313
recommendation (continued)
library list (continued)
user portion 196
limit capabilities (LMTCPB) 74
limiting
device sessions 83
message queue 92
naming
group profile 66
user profiles 65
password expiration interval
(PWDEXPITV) 83
passwords 67
priority limit (PTYLMT)
parameter 86
public authority
user profiles 101
QUSRLIBL system value 87
RSTLICPGM (Restore Licensed
Program) command 242
security design 208
security level (QSECURITY) system
value 11
set password to expired
(PWDEXP) 68
special authority (SPCAUT) 79
special environment (SPCENV) 80
summary 208
user class (USRCLS) 70
record-level security 224
recovering
authority holder 235
authorization list 235
damaged audit journal 269
damaged authorization list 243
object ownership 235
private authority 235
public authority 235
security information 235
user profiles 235
reference code table (*RCT) auditing 487
referenced object 153
rejecting
access
DDM request (DDM) 202
iSeries Access access 201
remote job submission 200
relational database directory
object authority required for
commands 418
remote job entry (QRJE) user profile 293
remote job entry (RJE)
object authority required for
commands 419
remote job submission
securing 200
remote service attribute (QRMTSRVATR)
system value 38
remote sign-on
QRMTSIGN system value 32
remote sign-on (QRMTSIGN) system
value 32, 252
Remove Authorization List Entry
(RMVAUTLE) command 154, 283
Remove Directory Entry (RMVDIRE)
command 288
673
restoring (continued)
maximum storage (MAXSTG) 84
object
audit journal (QAUDJRN)
entry 255
commands 235
ownership 235, 239
security issues 238
operating system 244
ownership change
audit journal (QAUDJRN)
entry 255
primary group 235, 239
private authority 235, 240
program failure
audit journal (QAUDJRN)
entry 255
program validation 17
programs 241
public authority 235, 239
QDFTOWN (default) owner
audit journal (QAUDJRN)
entry 255
restricting 203
security information 235
storage needed 84
uid (user identification number) 238
user profile
audit journal (QAUDJRN)
entry 255
command description 287
procedures 235, 237
restoring *CRQD (RQ) file layout 569
restoring *CRQD object (RQ) journal
entry type 255
restoring job description (RJ) file
layout 565
restoring job description (RJ) journal
entry type 255
restoring programs that adopt authority
(RP) file layout 567
restoring programs that adopt authority
(RP) journal entry type 255
restricted instruction
audit journal (QAUDJRN) entry 255
restricting
access
console 248
workstations 248
adjacent digits in passwords
(QPWDLMTAJC system value) 51
capabilities 73
characters in passwords 50
command line use 73
commands (ALWLMTUSR) 74
consecutive digits in passwords
(QPWDLMTAJC system value) 51
messages 20
QSYSOPR (system operator) message
queue 193
repeated characters in passwords 51
restore operations 203
save operations 203
security officer (QLMTSECOFR
system value) 248
674
risk (continued)
RSTLICPGM (Restore Licensed
Program) command 242
save commands 203
special authorities 76
RJ (restoring job description) file
layout 565
RJ (restoring job description) journal
entry type 255
RJE (remote job entry)
object authority required for
commands 419
RLSCMNDEV (Release Communications
Device) command
authorized IBM-supplied user
profiles 299
object auditing 454, 474
object authority required 332
RLSDSTQ (Release Distribution Queue)
command
authorized IBM-supplied user
profiles 299
object authority required 336
RLSIFSLCK (Release IFS Lock) command
authorized IBM-supplied user
profiles 299
RLSIFSLCK (Release IFS Lock) command)
command
object authority required 396
RLSJOB (Release Job) command
object authority required 368
RLSJOBQ (Release Job Queue) command
object auditing 470
object authority required 372
RLSJOBSCDE (Release Job Schedule
Entry) command
object auditing 471
object authority required 372
RLSOUTQ (Release Output Queue)
command
object auditing 481
object authority required 404
RLSRDR (Release Reader) command
object authority required 417
RLSRMTPHS (Release Remote Phase)
command
authorized IBM-supplied user
profiles 299
RLSSPLF (Release Spooled File)
command
object auditing 481
object authority required 427
RLSWTR (Release Writer) command
object authority required 440
RMVACC (Remove Access Code)
command
authorized IBM-supplied user
profiles 299
object auditing 461
object authority required 399
RMVAJE (Remove Autostart Job Entry)
command
object auditing 488
object authority required 428
RMVALRD (Remove Alert Description)
command
object auditing 446
Index
675
676
677
S
S/36 machine description (*S36)
auditing 497
SAV (Save) command
object auditing 443, 455, 494, 496
object authority required 351
SAVAPARDTA (Save APAR Data)
command
authorized IBM-supplied user
profiles 299
object authority required 423
SAVCFG (Save Configuration) command
object auditing 453, 474, 479, 480
object authority required 326
SAVCHGOBJ (Save Changed Object)
command
object auditing 443
object authority required 313
SAVDLO (Save Document Library Object)
command
object auditing 443, 459
object authority required 337
using 235
Save Document Library Object (SAVDLO)
command 235
Save Library (SAVLIB) command 235
Save Object (SAVOBJ) command 235,
271
Save Security Data (SAVSECDTA)
command 235, 287
save system (*SAVSYS) special authority
*OBJEXIST authority 120, 309
description 244
functions allowed 77
removed by system
changing security levels 13
risks 77
678
security
C2
description 6
critical files 224
designing 207
job description 192
keylock 2
library lists 193
objective
availability 1
confidentiality 1
integrity 1
output queue 197
overall recommendations 208
physical 2
planning 1
printer output 197
source files 232
spooled file 197
starting
batch job 186
interactive job 185
jobs 185
subsystem description 191
system values 3
tools 289
why needed 1
security (*SECURITY) audit level 255
security administrator (*SECADM)
special authority
functions allowed 76
security attribute
object authority required for
commands 423
security audit
object authority required for
commands 423
security audit journal
displaying entries 289
printing entries 603
security auditing
displaying 289, 601
setting up 289, 601
security auditing function
activating 267
CHGSECAUD 267
stopping 272
security command
list 283
security data
saving 235, 287
security information
backup 235
format on save media 237
format on system 236
recovery 235
restoring 235
saving 235
stored on save media 237
stored on system 236
security level (QSECURITY) system value
auditing 248
automatic user profile creation 63
changing
level 10 to level 20 12
level 20 to level 30 13
level 20 to level 40 18
Index
679
setting
Attention-key-handling program
(ATNPGM) 94
network attributes 290, 607
security values 607
system values 290, 607
setting up
auditing function 267
security auditing 289, 601
SETVTMAP (Set VT100 Keyboard Map)
command
object authority required 434
SETVTTBL (Set VT Translation Tables)
command
object authority required 434
SEV (message queue severity) parameter
user profile 92
severity (SEV) parameter
user profile 92
SF (action to spooled file) file layout 572
SF (change to spooled file) journal entry
type 255
share memory control (QSHRMEMCTL)
system value
description 33
possible values 33
shared folder
securing 202
sign-on
action when attempts reached
(QMAXSGNACN system value) 31
authorities required 185
authority failures 185
console 189
default
audit journal (QAUDJRN)
entry 255
incorrect password
audit journal (QAUDJRN)
entry 255
incorrect user ID
audit journal (QAUDJRN)
entry 255
limiting attempts 30
preventing default 251
remote (QRMTSIGN system
value) 32
restricting security officer 187
security checking 185
security officer fails 187
service user fails 187
user with *ALLOBJ special authority
fails 187
user with *SERVICE special authority
fails 187
without user ID 191
without user ID and password 16
workstation authority needed 187
sign-on information
displaying
DSPSGNINF user profile
parameter 82
QDSPSGNINF system value 26
Sign-on Information display
DSPSGNINF user profile
parameter 82
example 26
680
special authority
*ALLOBJ (all object)
auditing 250
automatically added 13
automatically removed 13
failed sign-on 187
functions allowed 76
risks 76
*AUDIT (audit)
functions allowed 78
risks 79
*IOSYSCFG (system configuration)
functions allowed 79
risks 79
*JOBCTL (job control)
functions allowed 76
output queue parameters 198
priority limit (PTYLMT)
parameter 85
risks 77
*SAVSYS (save system)
*OBJEXIST authority 120, 309
automatically removed 13
description 244
functions allowed 77
risks 77
*SECADM (security administrator)
functions allowed 76
*SERVICE (service)
failed sign-on 187
functions allowed 77
risks 77
*SPLCTL (spool control)
functions allowed 77
output queue parameters 199
risks 77
added by system
changing security level 13
adopted authority 136
analyzing assignment 603
changing security level 13
definition 75
LAN Server 79
listing users 278
recommendations 79
removed by system
automatically removed 238
changing security level 13
user profile 75
special authority (SPCAUT) parameter
recommendations 79
user profile 75
special environment (QSPCENV) system
value 80
special environment (SPCENV) parameter
recommendations 80
routing interactive job 80
Special Files (*CHRSF) auditing 448
spelling aid dictionary
object authority required for
commands 426
spelling aid dictionary (*SPADCT)
auditing 491
sphere of control
object authority required for
commands 427
spool (QSPL) user profile 293
storage (continued)
maximum (MAXSTG) parameter 84
reclaiming 20, 130, 244
setting QALWUSRDMN (allow
user objects) system value 25
threshold
audit (QAUDJRN) journal
receiver 270
user profile 84
storage pool 204
STRAPF (Start Advanced Printer
Function) command
object authority required 321, 342
STRBEST (Start Best/1-400 Capacity
Planner) command
object authority required 405
STRBEST (Start BEST/1) command
authorized IBM-supplied user
profiles 299
STRBGU (Start Business Graphics Utility)
command
object authority required 321
STRCBLDBG (Start COBOL Debug)
command
object authority required 376, 412
STRCGU (Start CGU) command
object authority required 340
STRCHTSVR (Start Clustered Hash Table
Server
authorized IBM-supplied user
profiles 299
STRCLNUP (Start Cleanup) command
object authority required 400
STRCMNTRC (Start Communications
Trace) command
authorized IBM-supplied user
profiles 299
object authority required 423
STRCMTCTL (Start Commitment Control)
command
object authority required 326
STRCPYSCN (Start Copy Screen)
command
object authority required 423
STRCSP (Start CSP/AE Utilities)
command
object auditing 484
STRDBG (Start Debug) command
authorized IBM-supplied user
profiles 299
object auditing 465, 483
object authority required 412
STRDBGSVR (Start Debug Server)
command
authorized IBM-supplied user
profiles 299
STRDBMON (Start Database Monitor)
command
object authority required 405
STRDBRDR (Start Database Reader)
command
object authority required 417
STRDFU (Start DFU) command
object authority required 321, 342
STRDIRSHD (Start Directory Shadow
System) command
object authority required 335
Index
681
682
system (continued)
saving 235, 287
system (*SYSTEM) domain 15
system (*SYSTEM) state 16
system (QSYS) library
authorization lists 127
system (QSYS) user profile
default values 293
restoring 238
system change-journal management
support 270
system configuration
*IOSYSCFG (system configuration)
special authority 79
system configuration (*IOSYSCFG)
special authority
functions allowed 79
risks 79
system console
See also console
QCONSOLE system value 189
system directory
changing
audit journal (QAUDJRN)
entry 255
system distribution directory
*SECADM (security administrator)
special authority 76
commands for working with 288
deleting user profile 110
system library list
changing 193, 216
QSYSLIBL system value 193
system management
changing
audit journal (QAUDJRN)
entry 255
system management (*SYSMGT) audit
level 255
system management change (SM) file
layout 577
system management change (SM) journal
entry type 255
system operations
special authority (SPCAUT)
parameter 75
system operator (QSYSOPR) user
profile 293
system password 118
system portion
library list
changing 216
description 193
recommendations 195
system program
calling directly 15
system reference code (SRC)
B900 3D10 (auditing error) 59
system reply list
object authority required for
commands 431
system request function
adopted authority 137
System request menu
options and commands 222
using 222
683
684
Index
685
T
TAA (tips and techniques) tool
Display Audit Log (DSPAUDLOG)
messages used 255
DSPAUDLOG (Display Audit Log)
messages used 255
table
object authority required for
commands 433
table (*TBL) auditing 497
tape
object authority required for
commands 390
protecting 248
tape cartridge
object authority required for
commands 390
TCP/IP (QTCP) user profile 293
TCP/IP (Transmission Control
Protocol/Internet Protocol)
object authority required for
commands 434
TCP/IP printing support (QTMPLPD)
user profile 293
TELNET (Start TCP/IP TELNET)
command
object authority required 434
temporary (QTEMP) library
security level 50 20
test request (QTSTRQS) user profile 293
text (TEXT) parameter
user profile 75
text index
object authority required for
commands 399
TFRBCHJOB (Transfer Batch Job)
command
object auditing 471
object authority required 368
TFRCTL (Transfer Control) command
object authority required 412
transferring adopted authority 136
TFRGRPJOB (Transfer to Group Job)
command
adopted authority 137
object authority required 368
TFRJOB (Transfer Job) command
object auditing 471
object authority required 368
TFRPASTHR (Transfer Pass-Through)
command
object authority required 335
TFRSECJOB (Transfer Secondary Job)
command
object authority required 368
time slice 204
time-out interval
inactive jobs (QINACTITV) system
value 27
message queue (QINACTMSGQ)
system value 28
token-ring
object authority required for
commands 389
total change of password 52
Transfer Control (TFRCTL) command
transferring adopted authority 136
686
U
uid (user identification number)
restoring 238
unauthorized
access
audit journal (QAUDJRN)
entry 255
programs 252
UNMOUNT (Remove Mounted File
System)
object authority required 439
UNMOUNT (Remove Mounted File
System) command
object authority required 396
unsupported interface
audit journal (QAUDJRN) entry 16,
255
update (*UPD) authority 120, 309
UPDDTA (Update Data) command
object authority required 342
UPDPGM (Update Program) command
object auditing 447, 476, 483
object authority required 412
UPDSRVPGM (Create Service Program)
command
object auditing 476
UPDSRVPGM (Update Service Program)
command
object auditing 448, 493
object authority required 412
upgrade order information
object authority required for
commands 435
use (*USE) authority 121, 310
use adopted authority (QUSEADPAUT)
system value
description 34
risk of changing 35
use adopted authority (USEADPAUT)
parameter 139
USEADPAUT (use adopted authority)
parameter 139
user
adding 106
auditing
changing 78
working with 115
enrolling 106
user (*USER) domain 15
user (*USER) state 16
user auditing
changing
command description 287
command descriptions 286
user authority
adding 148
copying
command description 286
example 109
recommendations 153
renaming profile 115
user class
analyzing assignment 603
user class (USRCLS) parameter
description 69
recommendations 70
USER DEF (user-defined) authority 147
user domain object
restricting 19
security exposure 19
user ID
DST (dedicated service tools)
changing 117
incorrect
audit journal (QAUDJRN)
entry 255
user identification number (uid)
restoring 238
user identification number( ) parameter
user profile 99
user index (*USRIDX) auditing 497
687
688
V
VA (access control list change) journal
entry type 255
VA (changing access control list) file
layout 581
validating
restored programs 17
validating parameters 17
validating password 53
validation list
object authority required for
commands 439
validation list (*VLDL) auditing 499
validation list (VO) file layout 584
validation lists
Internet user 232
Validation Lists, Create 232
Validation Lists, Delete 232
validation program, password 53, 54, 55
validation value
audit journal (QAUDJRN) entry 255
definition 17
VC (connection start and end) file
layout 582
VC (connection start or end) journal entry
type 255
verify object on restore (QVFYOBJRST)
system value 39
VF (close of server files) file layout 582
VFYCMN (Verify Communications)
command
authorized IBM-supplied user
profiles 299
object auditing 453, 474
object authority required 411, 423
VFYLNKLPDA (Verify Link supporting
LPDA-2) command
authorized IBM-supplied user
profiles 299
object authority required 423
VFYLNKLPDA (Verify Link Supporting
LPDA-2) command
object auditing 474
VFYMSTK (Verify Master Key) command
authorized IBM-supplied user
profiles 299
object authority required 330
VFYPIN (Verify Personal Identification
Number) command
authorized IBM-supplied user
profiles 299
object authority required 330
VFYPRT (Verify Printer) command
authorized IBM-supplied user
profiles 299
object authority required 411, 423
VFYTAP (Verify Tape) command
authorized IBM-supplied user
profiles 299
object authority required 411, 423
VFYTCPCNN (Verify TCP/IP
Connection) command
object authority required 434
viewing
audit journal entries 272
virtual device
automatic configuration (QAUTOVRT
system value) 36
definition 36
virtual printer
securing 202
virus
detecting 252, 280, 286
scanning 280
W
wireless LAN configuration
object authority required for
commands 341
Work with Authority (WRKAUT)
command 147, 284
Work with Authorization Lists
(WRKAUTL) command 283
Work with Database Files Using IDDU
(WRKDBFIDD) command
object authority required 367
Work with Directory (WRKDIRE)
command 288
Work with Journal (WRKJRN)
command 271, 277
Work with Journal Attributes
(WRKJRNA) command 271, 277
Work with Objects (WRKOBJ)
command 284
Work with Objects by Owner
(WRKOBJOWN) command
auditing 250
description 284
using 151
Work with Objects by Owner
display 110, 151
Work with Objects by Primary Group
(WRKOBJPGP) command 130, 152
description 284
Work with Output Queue Description
(WRKOUTQD) command 197
Work with Spooled Files (WRKSPLF)
command 197
689
690
Index
691
692
X
X0 (kerberos authentication) file
layout 589
Y
YC (change to DLO object) file
layout 593
YR (read of DLO object) file layout
593
Z
ZC (change to object) file layout 594
ZM (change to object) file layout 595
ZR (read of object) file layout 596
Overall satisfaction
Very Satisfied
Satisfied
Neutral
Dissatisfied
Very
Dissatisfied
h
How satisfied are you that the information in this book is:
Accurate
Complete
Easy to find
Easy to understand
Well organized
Applicable to your tasks
Very Satisfied
Satisfied
Neutral
Dissatisfied
h
h
h
h
h
h
h
h
h
h
h
h
h
h
h
h
h
h
h
h
h
h
h
h
Very
Dissatisfied
h
h
h
h
h
h
h Yes
h No
When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in any
way it believes appropriate without incurring any obligation to you.
Name
Company or Organization
Phone No.
Address
SC41-5302-06
___________________________________________________________________________________________________
Cut or Fold
Along Line
_ _ _ _ _ _ _Fold
_ _ _and
_ _ _Tape
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Please
_ _ _ _ _do
_ _not
_ _ staple
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _Fold
_ _ _and
_ _ Tape
______
NO POSTAGE
NECESSARY
IF MAILED IN THE
UNITED STATES
IBM CORPORATION
ATTN DEPT 542 IDCLERK
3605 HWY 52 N
ROCHESTER MN 55901-7829
_________________________________________________________________________________________
Fold and Tape
Please do not staple
Fold and Tape
SC41-5302-06
Cut or Fold
Along Line
Printed in U.S.A.
SC41-5302-06