IBM Support

How Registration Information and Functional Usage Information are Saved and Restored

Troubleshooting


Problem

The relationship of Registration Information and Functional Usage Information are revealed by save and restore of this infromation.

Resolving The Problem

Licensed Program Product Install registers Registration Information on the system. The list of Exit Points added is visible using the command: Work with Registration Info (WRKREGINF). This function registration information is saved with a complete save of library QUSRSYS in object
QUSRSYS/QUSEXRGOBJ *EXITRG. The function registration information can be restored by restoring the QUSEXRGOBJ *EXITRG object into QUSRSYS. This restores all of the registered functions and may require functional usage information to use the product Exit Points.

Functional usage information is visible using the command: Work with Function Usage (WRKFCNUSG). The command displays a list of function identifiers and function names. The usage information for an individual function is saved with the user profile's private authorities using the command: Save Security Data (SAVSECDTA). Functional usage information can be restored using the commands:
o Restore User Profiles, RSTUSRPRF USRPRF(*ALL)
o followed by, Restore Authority (RSTAUT)

It is the restore of all user profiles in combination with restore authority that completes the restore of these settings.

Note: The default usage information for a function is stored in internal objects that are saved during a SAVSECDTA and restored during a RSTUSRPRF USRPRF(*ALL). If the internal object already exists on the system, the default authority will be what was originally on the object (the authority from the saved object will not be restored). The *ALLOBJ special authority indicator will be changed to what was on the saved object.

Further information may be found at the following links:

IBM i > Version 7.3 > Security
Security reference
SC41-5302-13

http://www.ibm.com/support/knowledgecenter/en/ssw_ibm_i_73/rzarl/sc415302.pdf

Chapter 8. Backup and recovery of security information
Table 131. How security information is saved and restored

---

IBM i > Version 7.2 > Security
Security reference
SC41-5302-12

http://www.ibm.com/support/knowledgecenter/en/ssw_ibm_i_72/rzarl/sc415302.pdf

Chapter 8. Backup and recovery of security information
Table 131. How security information is saved and restored

---

IBM i > Version 7.1 > Security
Security reference
SC41-5302-11

http://www.ibm.com/support/knowledgecenter/en/ssw_ibm_i_71/rzarl/sc415302.pdf

Chapter 8. Backup and recovery of security information
Table 132. How security information is saved and restored

[{"Type":"MASTER","Line of Business":{"code":"LOB57","label":"Power"},"Business Unit":{"code":"BU058","label":"IBM Infrastructure w\/TPS"},"Product":{"code":"SWG60","label":"IBM i"},"Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.1.0"}]

Document Information

Modified date:
18 December 2019

UID

nas8N1021401