• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Low Risk Authority Changes

    May 19, 2010 Patrick Botz

    For years, many people, including me, have harangued you to “get rid of PUBLIC” authority. Despite all of the pleading, however, there remains a large number of customers that still have PUBLIC authority set to *USE or higher. I suspect at least part of the reason is because many of us are afraid to monkey with PUBLIC authority for fear of breaking something major. This fear is understandable. Many administrators are responsible for applications that were written before they joined the workforce.

    A fairly trivial technique that I call “alternative PUBLIC authority” takes the fear–and the risk–out of changing PUBLIC authority on libraries, programs, and data objects for virtually any application. The idea behind this technique is to create an environment that ensures nobody breaks while allowing you to make and test authority changes using selected user profiles. Alternative public authority will work for any environment where PUBLIC authority is something other than *EXCLUDE.

    Implementing alternative public authority is straightforward and fairly easy. Just follow these steps:

    1. Create a new user profile. For this tip we’ll call it “ALTPUBLIC”.
    2. Make every user profile on the system (except those profiles that are already group profiles) a member of this group. I use a small CL program to automate this task.
    3. For each library, program, and data object associated with the application that you want to fix, grant ALTPUBLIC the same authority that PUBLIC currently has to the object. In practice, I usually find that PUBLIC authority is the same for everything.
    4. Change PUBLIC authority on the same objects as step 3 to *EXCLUDE. Again, I have a small CL utility that automates steps 3 and 4. The utility isn’t required; it just saves time.

    You now have an environment that allows you to make and test all kinds of authority changes, including adopted authority, without fear of breaking any users. But you haven’t changed the security of your system one iota yet. You have only changed the way that you have guaranteed that no one will break. Ironically, the next task is to make the additional authority changes that allow you to get rid of ALTPUBLIC.

    It’s easiest to use an example to describe how to get rid of ALTPUBLIC. We’ll assume that you have decided to employ application-only access (adopted authority) for your primary application. After setting up alternative public authority, you: a) created a user profile, APPOWNER; b) changed the libraries, programs, and data objects associated with the application to be owned by APPOWNER; c) changed the initial program to adopt APPOWNER. Of course, these changes did not affect any users of the application.

    Now you want to find out what other changes you may need to make. For example, you may need to change programs that are submitted to batch to also adopt authority. But how do you find which programs these are? Easy. Select a user profile to use for testing. Remove that profile from the ALTPUBLIC group. Sign on as that user and run the application. This will find places in the application that need to be addressed further. Address the problems found. Now take another user profile out of the ALTPUBLIC group and repeat the testing. As your confidence in the changes increases you might remove the profiles for an entire department. Once you are completely confident in your changes, delete the ALTPUBLIC group profile.

    Patrick Botz is the principal consultant and founder of Botz & Associates Inc. He is also president of Valid Technologies, LLC, a biometric middleware ISV. Pat spent nearly 20 years working at IBM in various security roles including lead IBM i security architect, IBM eServer security team, and the head of IBM Lab Services Security Consulting practice. Check out his Website at www.botzandassociates.com. Send your questions or comments for Patrick to Ted Holt via the IT Jungle Contact page.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Midrange Dynamics North America

    Git up to speed with MDChange!

    Git can be lightning-fast when dealing with just a few hundred items in a repository. But when dealing with tens of thousands of items, transaction wait times can take minutes.

    MDChange offers an elegant solution that enables you to work efficiently any size Git repository while making your Git experience seamless and highly responsive.

    Learn more.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    PowerTech:  Download your free copy of the updated 2010 The State of IBM i Security today!
    inFORM Decisions:  Paperless saves $$$. Learn more and get FREE white papers.
    looksoftware:  re:new Webinar - June 8 at 10 a.m. (GMT) & June 9 at 2 p.m. (EDT)

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    IBS Fights ‘iSeries Perception,’ Steps Closer to Microsoft Power7 Blades Plus i Versus X64 Blades Plus Windows

    Leave a Reply Cancel reply

Volume 10, Number 16 -- May 19, 2010
THIS ISSUE SPONSORED BY:

WorksRight Software
Profound Logic Software
Botz & Associates, Inc.

Table of Contents

  • Low Risk Authority Changes
  • Prompt and Submit CL Commands
  • Admin Alert: CBU Product License Keys Can and Will Suddenly Expire

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Public Preview For Watson Code Assistant for i Available Soon
  • COMMON Youth Movement Continues at POWERUp 2025
  • IBM Preserves Memory Investments Across Power10 And Power11
  • Eradani Uses AI For New EDI And API Service
  • Picking Apart IBM’s $150 Billion In US Manufacturing And R&D
  • FAX/400 And CICS For i Are Dead. What Will IBM Kill Next?
  • Fresche Overhauls X-Analysis With Web UI, AI Smarts
  • Is It Time To Add The Rust Programming Language To IBM i?
  • Is IBM Going To Raise Prices On Power10 Expert Care?
  • IBM i PTF Guide, Volume 27, Number 20

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle