ANZDFTPWD 3,
14, 15(Q) |
|
|
|
ANZPRFACT 3,
14, 15(Q) |
|
|
|
CHGACTPRFL 14(Q) |
|
|
|
CHGACTSCDE 3,
14, 15(Q) |
|
|
|
CHGDSTPWD 1 |
|
|
|
CHGEXPSCDE 3,
14, 15(Q) |
|
|
|
CHGPRF |
User profile |
*OBJMGT, *USE |
|
Initial program 2 |
*USE |
*EXECUTE |
Initial menu 2 |
*USE |
*EXECUTE |
Job description 2 |
*USE |
*EXECUTE |
Message queue 2 |
*USE |
*EXECUTE |
Output queue 2 |
*USE |
*EXECUTE |
Attention-key- handling program 2 |
*USE |
*EXECUTE |
Current library 2 |
*USE |
*EXECUTE |
CHGPWD |
|
|
|
CHGUSRAUD 11(Q) |
|
|
|
CHGUSRPRF 3 |
User profile |
*OBJMGT, *USE |
*EXECUTE |
Initial program 2 |
*USE |
*EXECUTE |
Initial menu 2 |
*USE |
*EXECUTE |
Job description 2 |
*USE |
*EXECUTE |
Message queue 2 |
*USE |
*EXECUTE |
Output queue 2 |
*USE |
*EXECUTE |
Attention-key-handling program 2 |
*USE |
*EXECUTE |
Current library 2 |
*USE |
*EXECUTE |
Group profile (GRPPRF or SUPGRPPRF)2,4 |
*OBJMGT, *OBJOPR, *READ, *ADD, *UPD,
*DLT |
*EXECUTE |
CHGUSRPRTI |
User profile |
*CHANGE |
|
CHKPWD |
|
|
|
CRTUSRPRF 3,
12, 17 |
Initial program |
*USE |
*EXECUTE |
Initial menu |
*USE |
*EXECUTE |
Job description |
*USE |
*EXECUTE |
Message queue |
*USE |
*EXECUTE |
Output queue |
*USE |
*EXECUTE |
Attention-key- handling program |
*USE |
*EXECUTE |
Current library |
*USE |
*EXECUTE |
Group profile (GRPPRF or SUPGRPPRF)4 |
*OBJMGT, *OBJOPR, *READ, *ADD, *UPD,
*DLT |
*EXECUTE |
CVTUSRCERT3, 14 |
|
|
|
DLTUSRPRF 3,9 |
User profile |
*OBJEXIST, *USE |
*EXECUTE |
Message queue 5 |
*OBJEXIST, *USE, *DLT |
*EXECUTE |
DMPUSRPRF 22(Q)
|
User profile
|
|
|
DSPACTPRFL 14(Q) |
|
|
|
DSPACTSCD 14(Q) |
|
|
|
DSPAUTUSR 6 |
User profile |
*READ |
|
DSPEXPSCD 14(Q) |
|
|
|
DSPPGMADP |
User profile |
*OBJMGT |
|
Output file |
Refer to the general rules. |
Refer to the general rules. |
DSPSSTUSR 23 |
|
|
|
DSPUSRPRF19 |
User profile |
*READ |
*EXECUTE |
Output file |
Refer to the general rules. |
Refer to the general rules. |
DSPUSRPRTI |
User profile |
*USE |
|
GRTUSRAUT 7 |
Referenced user profile |
*READ |
|
Objects you are granting authority
to |
*OBJMGT |
*EXECUTE |
PRTPRFINT 14(Q) |
|
|
|
PRTUSRPRF 18 |
|
|
|
RSTAUT
(Q) 8 |
|
|
|
RSTUSRPRF
(Q) 8,10, 16 |
|
|
|
RTVUSRPRF20 |
User profile |
*READ |
|
RTVUSRPRTI |
User profile |
*USE |
|
SAVSECDTA 8 |
Save file, if empty |
*USE, *ADD |
*EXECUTE |
Save file, if records exist |
*OBJMGT, *USE, *ADD |
*EXECUTE |
WRKUSRPRF 13 |
User profile |
Any authority |
|
- 1
- This command can be run only if you are signed on as QSECOFR.
- 2
- You need authority only to the objects for fields you are changing
in the user profile.
- 3
- *SECADM special authority is required.
- 4
- *OBJMGT authority to the group profile cannot come from adopted
authority.
- 5
- The message queue associated with the user profile is deleted
if it is owned by that user profile. To delete the message queue,
the user running the DLTUSRPRF command must have the authorities specified.
|
- 6
- The display includes only user profiles to which the user running
the command has the specified authority.
- 7
- See the authorities required for the GRTOBJAUT command.
- 8
- *SAVSYS special authority is required.
- 9
- If you select the option to delete objects owned by the user profile,
you must have the necessary authority for the delete operations. If
you select the option to transfer ownership to another user profile,
you must have the necessary authority to the objects and to the target
user profile. See information for the CHGOBJOWN command.
- 10
- You must have *ALLOBJ special authority to specify a value other
than *NONE for the Allow object differences (ALWOBJDIF) parameter.
|
- 11
- You must have *AUDIT special authority.
- 12
- The user whose profile is created is given these authorities to
it: *OBJMGT, *OBJOPR, *READ, *ADD, *DLT, *UPD, *EXECUTE.
- 13
- To use an individual operation, you must have the authority required
by the operation.
- 14
- You must have *ALLOBJ special authority to use this command.
- 15
- You must have *JOBCTL special authority to use this command.
|
- 16
- You must have *ALLOBJ and *SECADM special authorities to specify
SECDTA(*PWDGRP), USRPRF(*ALL) or OMITUSRPRF.
- 17
- When you perform a CRTUSRPRF, you cannot create a user profile
(*USRPRF) into an independent disk pool. However, when a user is
privately authorized to an object in the independent disk pool, is
the owner of an object on an independent disk pool, or is the primary
group of an object on an independent disk pool, the name of the profile
is stored on the independent disk pool. If the independent disk pool
is moved to another system, the private authority, object ownership,
and primary group entries will be attached to the profile with the
same name on the target system. If a profile does not exist on
the target system, a profile will be created. The user will not have
any special authorities and the password will be set to *NONE.
- 18
- You must have *ALLOBJ or *AUDIT special authority to use this
command.
- 19
- You must have either *ALLOBJ or *AUDIT special authority to display
the current object auditing value and action auditing value displayed.
Otherwise, the value *NOTAVL is displayed to indicate that the values
are unavailable for display.
- 20
- You must have either *ALLOBJ or *AUDIT special authority to retrieve
the current OBJAUD and AUDLVL values. Otherwise, the value *NOTAVL
is returned to indicate that the values are unavailable for retrieval.
|
- 21
- To use this command, you must have service (*SERVICE) special
authority, or be authorized to the Service Dump function of IBM i through the support
of the IBM Navigator
for i Application
Administration. The Change Function Usage (CHGFCNUSG)
command with a function ID of QIBM_SERVICE_DUMP can also be used to
change the list of users that are allowed to perform dump operations.
- 22
- To use this command, you must have *SERVICE special authority
or have the authorization to the QIBM_SERVICE_DUMP function usage
list.
- 23
- You must have either security administrator (*SECADM) or audit
(*AUDIT) special authority to use this command.
|