Restoring security information

 

Recovering your system often requires restoring data and associated security information.

The usual sequence for recovery is:

  1. Restore user profiles and authorization lists (RSTUSRPRF USRPRF(*ALL)).

  2. Restore objects (RSTLIB, RSTOBJ, or RSTCFG).

  3. Restore the private authorities to objects (RSTAUT).

 

Parent topic:

Managing security