dmpmqaut (dump MQ authorizations)

Dump a list of current authorizations for a range of IBM MQ object types and profiles.


Purpose

Use the dmpmqaut command to dump the current authorizations to a specified object.


Syntax

dmpmqaut -m QMgrName -n Profile -l  -a  -t ObjectType -s ServiceComponent -p PrincipalName -g GroupName -e  -x


Optional parameters

    -m QMgrName
    Dump authority records only for the queue manager specified. If we omit this parameter, only authority records for the default queue manager are dumped.

    -n Profile
    The name of the profile for which to dump authorizations. The profile name can be generic, using wildcard characters to specify a range of names as explained in Use OAM generic profiles on UNIX, Linux, and Windows systems.

    -l
    Dump only the profile name and type. Use this option to generate a terse list of all defined profile names and types.

    -a
    Generate set authority commands.

    -t ObjectType
    The type of object for which to dump authorizations. Possible values are:

    Value Description
    authinfo An authentication information object, for use with TLS channel security
    channel or chl A channel
    clntconn or clcn A client connection channel
    listener or lstr A listener
    namelist or nl A namelist
    process or prcs A process
    queue or q A queue or queues matching the object name parameter
    qmgr A queue manager
    rqmname or rqmn A remote queue manager name
    service or srvc A service
    topic or top A topic

    -s ServiceComponent
    If installable authorization services are supported, specifies the name of the authorization service for which to dump authorizations. This parameter is optional; if you omit it, the authorization inquiry is made to the first installable component for the service.

    -p PrincipalName
    This parameter applies to Windows only; UNIX systems keep only group authority records. The name of a user for whom to dump authorizations to the specified object. The name of the principal can optionally include a domain name, specified in the following format:
    userid@domain
    

    For more information about including domain names on the name of a principal, see Principals and groups.

    -g GroupName
    The name of the user group for which to dump authorizations. We can specify only one name, which must be the name of an existing user group. For IBM MQ for Windows only, the group name can optionally include a domain name, specified in the following formats:
    GroupName@domain
    domain\GroupName
    

    -e
    Display all profiles used to calculate the cumulative authority that the entity has to the object specified in -n Profile. The variable Profile must not contain any wildcard characters. The following parameters must also be specified:

    • -m QMgrName
    • -n Profile
    • -t ObjectType

    and either -p PrincipalName, or -g GroupName.

    -x
    Display all profiles with the same name as specified in -n Profile. This option does not apply to the QMGR object, so a dump request of the form dmpmqaut -m QM -t QMGR ... -x is not valid.


Examples

The following examples show the use of dmpmqaut to dump authority records for generic profiles:
  1. This example dumps all authority records with a profile that matches queue a.b.c for principal user1.
    dmpmqaut -m qm1 -n a.b.c -t q -p user1
    
    The resulting dump would look something like this:
     
    profile:     a.b.*
    object type: queue
    entity:      user1
    type:        principal
    authority:   get, browse, put, inq
    
    Note: On UNIX, we cannot use the -p option. We must use -g groupname instead.
  2. This example dumps all authority records with a profile that matches queue a.b.c.
    dmpmqaut -m qmgr1 -n a.b.c -t q
    
    The resulting dump would look something like this:
    profile:     a.b.c
    object type: queue
    entity:      Administrator
    type:        principal
    authority:   all
    - - - - - - - - - - - - - - - - - 
    profile:     a.b.*
    object type: queue
    entity:      user1
    type:        principal
    authority:   get, browse, put, inq
    - - - - - - - - - - - - - - - - - 
    profile:     a.**
    object type: queue
    entity:      group1
    type:        group
    authority:   get 
    
  3. This example dumps all authority records for profile a.b.*, of type queue.
    dmpmqaut -m qmgr1 -n a.b.* -t q
    
    The resulting dump would look something like this:
    profile:     a.b.*
    object type: queue
    entity:      user1
    type:        principal
    authority:   get, browse, put, inq
    
  4. This example dumps all authority records for queue manager qmX.
    dmpmqaut -m qmX
    
    The resulting dump would look something like this:
    profile:     q1
    object type: queue
    entity:      Administrator
    type:        principal
    authority:   all
    - - - - - - - - - - - - - - - - - 
    profile:     q*
    object type: queue
    entity:      user1
    type:        principal
    authority:   get, browse
    - - - - - - - - - - - - - - - - - 
    profile:     name.*
    object type: namelist
    entity:      user2
    type:        principal
    authority:   get
    - - - - - - - - - - - - - - - - - 
    profile:     pr1
    object type: process
    entity:      group1
    type:        group
    authority:   get
    
  5. This example dumps all profile names and object types for queue manager qmX.
    dmpmqaut -m qmX -l
    
    The resulting dump would look something like this:
    profile: q1, type: queue
    profile: q*, type: queue
    profile: name.*, type: namelist
    profile: pr1, type: process
    

Note:

  1. For Windows only, all principals displayed include domain information, for example:
    profile:     a.b.*
    object type: queue
    entity:      user1@domain1
    type:        principal
    authority:   get, browse, put, inq
    
  2. Each class of object has authority records for each group or principal. These records have the profile name @CLASS and track the crt (create) authority common to all objects of that class. If the crt authority for any object of that class is changed then this record is updated. For example:
    profile:     @class
    object type: queue
    entity:      test
    entity type: principal
    authority:   crt
    
    This shows that members of the group test have crt authority to the class queue.
  3. For Windows only, members of the Administrators group are by default given full authority. This authority, however, is given automatically by the OAM, and is not defined by the authority records. The dmpmqaut command displays authority defined only by the authority records. Unless an authority record has been explicitly defined, therefore, running the dmpmqaut command against the Administrators group displays no authority record for that group.