• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Low Risk Authority Changes

    May 19, 2010 Patrick Botz

    For years, many people, including me, have harangued you to “get rid of PUBLIC” authority. Despite all of the pleading, however, there remains a large number of customers that still have PUBLIC authority set to *USE or higher. I suspect at least part of the reason is because many of us are afraid to monkey with PUBLIC authority for fear of breaking something major. This fear is understandable. Many administrators are responsible for applications that were written before they joined the workforce.

    A fairly trivial technique that I call “alternative PUBLIC authority” takes the fear–and the risk–out of changing PUBLIC authority on libraries, programs, and data objects for virtually any application. The idea behind this technique is to create an environment that ensures nobody breaks while allowing you to make and test authority changes using selected user profiles. Alternative public authority will work for any environment where PUBLIC authority is something other than *EXCLUDE.

    Implementing alternative public authority is straightforward and fairly easy. Just follow these steps:

    1. Create a new user profile. For this tip we’ll call it “ALTPUBLIC”.
    2. Make every user profile on the system (except those profiles that are already group profiles) a member of this group. I use a small CL program to automate this task.
    3. For each library, program, and data object associated with the application that you want to fix, grant ALTPUBLIC the same authority that PUBLIC currently has to the object. In practice, I usually find that PUBLIC authority is the same for everything.
    4. Change PUBLIC authority on the same objects as step 3 to *EXCLUDE. Again, I have a small CL utility that automates steps 3 and 4. The utility isn’t required; it just saves time.

    You now have an environment that allows you to make and test all kinds of authority changes, including adopted authority, without fear of breaking any users. But you haven’t changed the security of your system one iota yet. You have only changed the way that you have guaranteed that no one will break. Ironically, the next task is to make the additional authority changes that allow you to get rid of ALTPUBLIC.

    It’s easiest to use an example to describe how to get rid of ALTPUBLIC. We’ll assume that you have decided to employ application-only access (adopted authority) for your primary application. After setting up alternative public authority, you: a) created a user profile, APPOWNER; b) changed the libraries, programs, and data objects associated with the application to be owned by APPOWNER; c) changed the initial program to adopt APPOWNER. Of course, these changes did not affect any users of the application.

    Now you want to find out what other changes you may need to make. For example, you may need to change programs that are submitted to batch to also adopt authority. But how do you find which programs these are? Easy. Select a user profile to use for testing. Remove that profile from the ALTPUBLIC group. Sign on as that user and run the application. This will find places in the application that need to be addressed further. Address the problems found. Now take another user profile out of the ALTPUBLIC group and repeat the testing. As your confidence in the changes increases you might remove the profiles for an entire department. Once you are completely confident in your changes, delete the ALTPUBLIC group profile.

    Patrick Botz is the principal consultant and founder of Botz & Associates Inc. He is also president of Valid Technologies, LLC, a biometric middleware ISV. Pat spent nearly 20 years working at IBM in various security roles including lead IBM i security architect, IBM eServer security team, and the head of IBM Lab Services Security Consulting practice. Check out his Website at www.botzandassociates.com. Send your questions or comments for Patrick to Ted Holt via the IT Jungle Contact page.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    DevSecOps & Peer Review – The Power of Automation

    In today’s fast-paced development environments, security can no longer be an afterthought. This session will explore how DevSecOps brings security into every phase of the DevOps lifecycle—early, consistently, and effectively.

    In this session, you’ll discover:

    • What DevSecOps is and why it matters?
    • Learn how to formalize your security concerns into a repeatable process
    • Discover the power of automation through pull requests, approval workflows, segregation of duties, peer review, and more—ensuring your data and production environments are protected without slowing down delivery.

    Whether you’re just getting started or looking to enhance your practices, this session will provide actionable insights to strengthen your security posture through automation and team alignment to bring consistency to the process.

    Watch Now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    PowerTech:  Download your free copy of the updated 2010 The State of IBM i Security today!
    inFORM Decisions:  Paperless saves $$$. Learn more and get FREE white papers.
    looksoftware:  re:new Webinar - June 8 at 10 a.m. (GMT) & June 9 at 2 p.m. (EDT)

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    IBS Fights ‘iSeries Perception,’ Steps Closer to Microsoft Power7 Blades Plus i Versus X64 Blades Plus Windows

    Leave a Reply Cancel reply

Volume 10, Number 16 -- May 19, 2010
THIS ISSUE SPONSORED BY:

WorksRight Software
Profound Logic Software
Botz & Associates, Inc.

Table of Contents

  • Low Risk Authority Changes
  • Prompt and Submit CL Commands
  • Admin Alert: CBU Product License Keys Can and Will Suddenly Expire

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Power Systems Grows Nicely In Q3, Looks To Grow For All 2025, Too
  • Beta Of MCP Server Opens Up IBM i For Agentic AI
  • Sundry IBM i And Power Stack Announcements For Your Consideration
  • Please Take The IBM i Marketplace Survey
  • IBM i PTF Guide, Volume 27, Number 43
  • IBM Pulls The Curtain Back A Smidge On Project Bob
  • IBM Just Killed Merlin. Here’s Why
  • Guru: Playing Sounds From An RPG Program
  • A Bit More Insight Into IBM’s “Spyre” AI Accelerator For Power
  • IBM i PTF Guide, Volume 27, Number 42

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle