Category Archives for "Authority"

Give AS400 users the ability to change user authority temporarily

More questions about adopting authority on IBM i Systems and a technique to change user authority temporarily. So lets #discuss 😉 Adopt higher IBM i Authority to change System Configuration Question: I am needing to write a program, command, or whatever, that will enable my users to adopt a higher authority when they want to […]

Continue reading

An old AS400 Quiz willed with technical questions and plain old fashioned AS/400 brainteasers

So, last night I was nosing around in the dim dark corners of an old network share on my homeserver. I stumbled across an old TXT document from the late 90’s, I think. It was sitting in a text file called “AS400 Quiz Brainteasers” -it’s obviously old (look at the as400 model numbers question). It […]

Continue reading

Trump announces we need to start planning for the Y10K Software Crisis

Washington DC – President Trump announced his government is launching a special software advisory group – “Not long ago we all went through the Year 2000 crisis. If you were in the computer and software industry you recall the many headaches in converting and changing databases and software so the Year 2000 would be a […]

Continue reading

Adopting Authority – Problems with SQL RPG Programs

RPG PROGRAM USER(*OWNER) – Adopts the object owner level of Authority Most IBM i Programmers are aware of the USER(*OWNER) compile setting — anyone calling this program will adopt the authority level of the program. So if a program is compiled by user QSECOFR and USER(*OWNER) then anyone calling that program will automatically be elevated […]

Continue reading

AS400 Virus – Security holes from the golden age

Today, I was talking *techie* to a colleague in I.T. who still calls the IBM i Operating System – ‘The AS/400’. (but dont get me started on that) We bumped over a few ‘technology sleeping policemen’ during the conversation. Software is easy to upgrade. Mindsets are sometimes overlooked. This reminded me of the importance of […]

Continue reading

IBM i laughs at the bleeding heart

News of the moment is the deadly sounding HEARTBLEED SECURITY FLAW   The flaw, dubbed “Heartbleed”, could reveal anything which is currently being processed by a web server – including our sensitive secure information being used inside the site. Heartbleed’s technical name is ‘the CVE-2014-0160 exploit’ which exposes vulnerabilities in the popular OpenSSL server software […]

Continue reading

Adopt User Authority at Runtime

More questions about adopting authority on IBM i Systems. So lets #discuss 😉 Adopt User Authority at Runtime Question: I have a batch job which is run by the user but needs to use a file with security denied to the user. Somewhere I heard or read about adopt authority, which would allow the job […]

Continue reading