Sequence for restoring security information
Recovering your system often requires restoring data and associated security information. It is essential that you restore security information in the correct sequence. Otherwise, object ownership and authority information is not restored correctly and your applications might not run correctly.
Security information on your system consists of the following items:
- User profiles and group profiles
- Authorization lists
- Authority holders
- Authority information that is stored with objects:
- Owner
- Owner authority
- Primary group
- Primary group authority
- Public authority
- Authority list
- Private authorities
- Digital Certificate Manager (DCM) data
- Function usage information
The recovery checklists include the correct sequence of steps for restoring security information. If you are developing your own restore procedure, restore security information in the following sequence:
Note: Alternatively, you can restore private authorities
for objects by specifying the PVTAUT(*YES) parameter on the restore command.