dmpmqaut (dump MQ authorizations)

Dump a list of current authorizations for a range of IBM® MQ object types and profiles.

Purpose

Use the dmpmqaut command to dump the current authorizations to a specified object.

Syntax

Read syntax diagramSkip visual syntax diagramdmpmqaut -m QMgrName -n Profile -l  -a  -t ObjectType -s ServiceComponent -p PrincipalName -g GroupName -e  -x

Optional parameters

-m QMgrName
Dump authority records only for the queue manager specified. If you omit this parameter, only authority records for the default queue manager are dumped.
-n Profile
The name of the profile for which to dump authorizations. The profile name can be generic, using wildcard characters to specify a range of names as explained in Using OAM generic profiles on AIX®, Linux®, and Windows systems.
-l
Dump only the profile name and type. Use this option to generate a terse list of all defined profile names and types.
-a
Generate set authority commands.
-t ObjectType
The type of object for which to dump authorizations. Possible values are:
Value Description
authinfo An authentication information object, for use with TLS channel security
channel or chl A channel
clntconn or clcn A client connection channel
listener or lstr A listener
namelist or nl A namelist
process or prcs A process
queue or q A queue or queues matching the object name parameter
qmgr A queue manager
rqmname or rqmn A remote queue manager name
service or srvc A service
topic or top A topic
-s ServiceComponent
If installable authorization services are supported, specifies the name of the authorization service for which to dump authorizations. This parameter is optional; if you omit it, the authorization inquiry is made to the first installable component for the service.
[Windows]-p PrincipalName
This parameter applies to Windows only; AIX and Linux systems keep only group authority records.
The name of a user for whom to dump authorizations to the specified object. The name of the principal can optionally include a domain name, specified in the following format:

userid@domain

For more information about including domain names on the name of a principal, see Principals and groups.

-g GroupName
The name of the user group for which to dump authorizations. You can specify only one name, which must be the name of an existing user group.
[Windows]For IBM MQ for Windows only, the group name can optionally include a domain name, specified in the following formats:

GroupName@domain
domain\GroupName
-e
Display all profiles used to calculate the cumulative authority that the entity has to the object specified in -n Profile. The variable Profile must not contain any wildcard characters.
The following parameters must also be specified:
  • -m QMgrName
  • -n Profile
  • -t ObjectType
and either -p PrincipalName, or -g GroupName.
-x
Display all profiles with the same name as specified in -n Profile. This option does not apply to the QMGR object, so a dump request of the form dmpmqaut -m QM -t QMGR ... -x is not valid.

Examples

The following examples show the use of dmpmqaut to dump authority records for generic profiles:
  1. This example dumps all authority records with a profile that matches queue a.b.c for principal user1.
    
    dmpmqaut -m qm1 -n a.b.c -t q -p user1
    
    The resulting dump would look something like this:
     
    profile:     a.b.*
    object type: queue
    entity:      user1
    type:        principal
    authority:   get, browse, put, inq
    
    [AIX][Linux]Note: On AIX and Linux, you cannot use the -p option. You must use -g groupname instead.
  2. This example dumps all authority records with a profile that matches queue a.b.c.
    
    dmpmqaut -m qmgr1 -n a.b.c -t q
    
    The resulting dump would look something like this:
    
    profile:     a.b.c
    object type: queue
    entity:      Administrator
    type:        principal
    authority:   all
    - - - - - - - - - - - - - - - - - 
    profile:     a.b.*
    object type: queue
    entity:      user1
    type:        principal
    authority:   get, browse, put, inq
    - - - - - - - - - - - - - - - - - 
    profile:     a.**
    object type: queue
    entity:      group1
    type:        group
    authority:   get 
    
  3. This example dumps all authority records for profile a.b.*, of type queue.
    
    dmpmqaut -m qmgr1 -n a.b.* -t q
    
    The resulting dump would look something like this:
    
    profile:     a.b.*
    object type: queue
    entity:      user1
    type:        principal
    authority:   get, browse, put, inq
    
  4. This example dumps all authority records for queue manager qmX.
    
    dmpmqaut -m qmX
    
    The resulting dump would look something like this:
    
    profile:     q1
    object type: queue
    entity:      Administrator
    type:        principal
    authority:   all
    - - - - - - - - - - - - - - - - - 
    profile:     q*
    object type: queue
    entity:      user1
    type:        principal
    authority:   get, browse
    - - - - - - - - - - - - - - - - - 
    profile:     name.*
    object type: namelist
    entity:      user2
    type:        principal
    authority:   get
    - - - - - - - - - - - - - - - - - 
    profile:     pr1
    object type: process
    entity:      group1
    type:        group
    authority:   get
    
  5. This example dumps all profile names and object types for queue manager qmX.
    
    dmpmqaut -m qmX -l
    
    The resulting dump would look something like this:
    
    profile: q1, type: queue
    profile: q*, type: queue
    profile: name.*, type: namelist
    profile: pr1, type: process
    
Note:
  1. [Windows]For Windows only, all principals displayed include domain information, for example:
    
    profile:     a.b.*
    object type: queue
    entity:      user1@domain1
    type:        principal
    authority:   get, browse, put, inq
    
  2. Each class of object has authority records for each group or principal. These records have the profile name @CLASS and track the crt (create) authority common to all objects of that class. If the crt authority for any object of that class is changed then this record is updated. For example:
    
    profile:     @class
    object type: queue
    entity:      test
    entity type: principal
    authority:   crt
    
    This shows that members of the group test have crt authority to the class queue.
  3. [Windows]For Windows only, members of the Administrators group are by default given full authority. This authority, however, is given automatically by the OAM, and is not defined by the authority records. The dmpmqaut command displays authority defined only by the authority records. Unless an authority record has been explicitly defined, therefore, running the dmpmqaut command against the Administrators group displays no authority record for that group.