Security
The i5/OS® operating system provides many security features that help you control access to data and files.
These topics describe some of the file security functions. The topics covered include types of object authority including object operational, object existence, object management, object reference, and object alter authorities. Data authority and why you would want to limit user access to data is also described. Other topics that are included are authorities that are required for file operations and how to limit access to files and data when you are creating files.
- Object authority
There are several types of authority that can be granted to a user for a file. Also, you can use the SQL GRANT and REVOKE statements to assign and remove these i5/OS authorities to SQL tables, including individual columns within those tables.
- Data authorities
You can use data authorities to limit user access to the data in files.
- Authorities required for file operations
This topic lists the file object authority and data authority required for file functions.
- Limitation of access to files and data when creating files
Specifying authorities allows you to control access to a file. You use the AUT parameter on the create command to specify public authority when you create a file.
Parent topic:
Database file management
Related information