Distribution commands
This table lists the specific authorities required for the distribution commands.
Commands identified by (Q) are shipped with public authority *EXCLUDE. Commands shipped with public authority *EXCLUDE shows which IBM-supplied user profiles are authorized to the command. The security officer can grant *USE authority to others.
Command | Referenced object | Authority needed | |
---|---|---|---|
For object | For library | ||
ADDDSTQ (Q) | |||
ADDDSTRTE (Q) | |||
ADDDSTSYSN (Q) | |||
CFGDSTSRV (Q) | |||
CFGRPDS (Q) | |||
CHGDSTD 1 | Document 2 | *CHANGE | *EXECUTE |
CHGDSTQ (Q) | |||
CHGDSTRTE (Q) | |||
DLTDST 1 | |||
DSPDSTLOG (Q) | Journal | *USE | *EXECUTE |
Journal receiver | *USE | *EXECUTE | |
DSPDSTSRV (Q) | |||
HLDDSTQ (Q) | |||
INZDSTQ (Q) | |||
QRYDST 1 | Requested file | *CHANGE | *EXECUTE |
RCVDST 1 | Requested file | *CHANGE | *EXECUTE |
Folder | *CHANGE | *EXECUTE | |
RLSDSTQ (Q) | |||
RMVDSTQ (Q) | |||
RMVDSTRTE (Q) | |||
RMVDSTSYSN (Q) | |||
SNDDST 1 | Requested file or document | *USE | *EXECUTE |
SNDDSTQ (Q) | |||
WRKDSTQ (Q) | |||
WRKDPCQ (Q) | |||
|