Troubleshooting
Problem
The relationship of Registration Information and Functional Usage Information are revealed by save and restore of this infromation.
Resolving The Problem
Licensed Program Product Install registers Registration Information on the system. The list of Exit Points added is visible using the command: Work with Registration Info (WRKREGINF). This function registration information is saved with a complete save of library QUSRSYS in object
QUSRSYS/QUSEXRGOBJ *EXITRG. The function registration information can be restored by restoring the QUSEXRGOBJ *EXITRG object into QUSRSYS. This restores all of the registered functions and may require functional usage information to use the product Exit Points.
Functional usage information is visible using the command: Work with Function Usage (WRKFCNUSG). The command displays a list of function identifiers and function names. The usage information for an individual function is saved with the user profile's private authorities using the command: Save Security Data (SAVSECDTA). Functional usage information can be restored using the commands:
o Restore User Profiles, RSTUSRPRF USRPRF(*ALL)
o followed by, Restore Authority (RSTAUT)
It is the restore of all user profiles in combination with restore authority that completes the restore of these settings.
Note: The default usage information for a function is stored in internal objects that are saved during a SAVSECDTA and restored during a RSTUSRPRF USRPRF(*ALL). If the internal object already exists on the system, the default authority will be what was originally on the object (the authority from the saved object will not be restored). The *ALLOBJ special authority indicator will be changed to what was on the saved object.
Further information may be found at the following links:
IBM i > Version 7.3 > Security
Security reference
SC41-5302-13
http://www.ibm.com/support/knowledgecenter/en/ssw_ibm_i_73/rzarl/sc415302.pdf
Chapter 8. Backup and recovery of security information
Table 131. How security information is saved and restored
---
IBM i > Version 7.2 > Security
Security reference
SC41-5302-12
http://www.ibm.com/support/knowledgecenter/en/ssw_ibm_i_72/rzarl/sc415302.pdf
Chapter 8. Backup and recovery of security information
Table 131. How security information is saved and restored
---
IBM i > Version 7.1 > Security
Security reference
SC41-5302-11
http://www.ibm.com/support/knowledgecenter/en/ssw_ibm_i_71/rzarl/sc415302.pdf
Chapter 8. Backup and recovery of security information
Table 132. How security information is saved and restored
Was this topic helpful?
Document Information
Modified date:
18 December 2019
UID
nas8N1021401