Authorization lists

Authorization lists consist of a list of users or groups, the type of authority (use, change, and exclude) for each user or group, and a list of objects to which this list provides access.

Providing each user with explicit access to every object the user needs to work with might create a great deal of duplicated effort because many users need to access the same group of objects. A much easier way to provide this access is to create authorization lists. Users and groups can then be authorized to this list, which grants them authority to everything that the list contains.

To work with authorization lists, open Security in System i® Navigator and select Authorization lists.

For example, an authorization list can be created to contain a list of objects related to an inventory database. A user responsible for ordering new inventory items can be granted authority to see the contents of the database objects. Additionally, a user group in shipping and receiving needs to update this database as parts come in and out of stock. This group can have authority to change the contents of the objects.