As a general principle, you should implement security at a generic level, that is, by choosing appropriate groupings of profiles and controlling rights at a library/profile level. Avoid implementing security at too detailed of a level.
Do not attempt to authorize every user explicitly to every object. Either authorize the group profile to the library containing the object, or add the group profile to an authorization list attached to the object (IBM i only).
|
Copyright © 2014 CA.
All rights reserved.
|
|