Authorization list commands

This table lists the specific authorities required for the authorization list commands.

Command Referenced object Authority needed
For object For QSYS library
ADDAUTLE 1,Start of change6End of change *AUTL *AUTLMGT or ownership *EXECUTE
CHGAUTLE 1,Start of change6End of change *AUTL *AUTLMGT or ownership *EXECUTE
CRTAUTL      
DLTAUTL *AUTL Owner or *ALLOBJ *EXECUTE
DSPAUTL *AUTL Start of change6End of change   *EXECUTE
Output file Refer to the general rules. Refer to the general rules.
DSPAUTLDLO *AUTL *USE *EXECUTE
DSPAUTLOBJ *AUTL Start of change6End of change *READ *EXECUTE
Output file Refer to the general rules. Refer to the general rules.
EDTAUTL 1,Start of change6End of change *AUTL *AUTLMGT or ownership *EXECUTE
RMVAUTLE 1,Start of change6End of change *AUTL *AUTLMGT or ownership *EXECUTE
RTVAUTLE 2, Start of change6End of change *AUTL *AUTLMGT or ownership *EXECUTE
WRKAUTL 3,4,5,Start of change6End of change *AUTL    
1
You must be the owner or have authorization list management authority.
2
If you do not have *OBJMGT or *AUTLMGT, you can retrieve *PUBLIC authority and your own authority. You must have *READ authority to your own profile to retrieve your own authority.
3
To use an individual operation, you must have the authority required by the operation.
4
You must not be excluded (*EXCLUDE) from the authorization list.
5
Some authority to the authorization list is required.
Start of change6End of change
Start of changeIf you are authorized to the IBM i Database Security Administrator function (QIBM_DB_SECADM) you do not need the specified authority to the object. However, users authorized to the QIBM_DB_SECADM function cannot add themselves to an authorization list or change their current authority on an authorization list unless they have the authorities required for the operation.End of change