System-defined authorities
Your system was shipped with several system-defined authorities: *USE, *CHANGE, *ALL, and *EXCLUDE. These authorities apply to securing files, programs, and libraries.
Use this information to plan system-defined authorities. To design simple resource security, try to plan security for entire libraries. The table shows how system-defined authorities apply to securing files, programs, and libraries:
*USE authority | *CHANGE authority | *ALL authority | *EXCLUDE1 authority | |
---|---|---|---|---|
Operations allowed for files | View information in the file. | View, change, and delete records in the file. | Create and delete the file. Add, change, and delete records in the file. Authorize others to use the file. | None. |
Operations not allowed for files | Change or delete any information in the file. Delete the file. | Delete or clear the entire file. | None. | Any access to the file. |
Operations allowed for programs | Run the program. | Change the description of the program. | Create, change, and delete the program. Authorize others to use the program. | None. |
Operations not allowed for programs | Change or delete the program. | Change or delete the program. | Change the owner of the program, if the program adopts authority. | Any access to the program. |
Operations allowed for libraries |
|
|
|
None. |
Operations not allowed for libraries |
|
Delete the library. | None. | Any access to the library. |
|