Case 9: Using an authorization list
This case demonstrates the advantage of using authorization lists.
The ARWKR01 file in library CUSTLIB is secured by the ARLST1 authorization list. Figure 1 and Figure 2 show the authorities:
Display Object Authority
Object . . . . . . . : ARWRK01 Owner . . . . . . . : OWNAR
Library . . . . . : CUSTLIB Primary group . . . : *NONE
Object type . . . . : *FILE ASP device . . . . . : *SYSBAS
Object secured by authorization list. . . . . . . . . . . . : ARLST1
Object
User Group Authority
OWNCP *ALL
*PUBLIC *USE
Display Authorization List
Object . . . . . . . : ARLST1 Owner . . . . . . . : OWNAR
Library . . . . . : QSYS Primary group . . . : *NONE
Object List
User Group Authority Mgt
OWNCP *ALL
AMESJ *CHANGE
*PUBLIC *USE
User AMESJ, who is not a member of a group profile, needs *CHANGE authority to the ARWRK01 file. These are the authority-checking steps:
Analysis:
This example demonstrates that authorization lists can make authorities easy to manage and provide good performance. This is particularly true if objects secured by the authorization list do not have any private authorities.
If AMESJ were a member of a group profile, it will add additional steps to this example, but it will not add an additional search of private authorities, as long as no private authorities are defined for the ARWRK01 file. Performance problems are most likely to occur when private authorities, authorization lists, and group profiles are combined, as in Case 11: Combining authorization methods.