Implementing resource security

This information helps you establish resource security for workstations and printers by setting ownership and public authority to objects, as well as specific authority to applications.

Your most important protection is resource security on your server. Resource security on the system allows you to define who can use objects and how those objects can be used. The ability to access an object is called authority. When you set up object authority, you can need to be careful to give your users enough authority to do their work without giving them the authority to browse and change the system. Object authority gives permissions to the user for a specific object and can specify what the user is allowed to do with the object. An object resource can be limited through specific detailed user authorities, such as adding records or changing records.

System resources can be used to give the user access to specific system-defined subsets of authorities: *ALL, *CHANGE, *USE, and *EXCLUDE. Files, programs, libraries, and directories are the most common system objects that require resource security protection, but you can specify authority for any individual object on the system.

You will need the following worksheets during this process:
  • The Application description worksheet
  • The Authorization list worksheet
  • The Library description worksheet
  • The Output queue and workstation security worksheet
  • The System responsibilities worksheet