System Sentinel: Moving to an Exclusionary Access Control Model, Part 2
** This thread discusses the article: System Sentinel: Moving to an Exclusionary Access Control Model, Part 2 **
After reading both parts of the Exclusionary Access Control Model I wonder if one could more likely perform an all-in-one plan instead of application by application. My thoughts are change all applications and application data files to owned by a profile like QPGMR. Change the applications' authorities to *USE and adopt authority. Then change system PUBLIC authority to *EXCLUDE along with QSYS library and all user libraries. Am I oversimplifying?
Unconfigured Ad Widget
Collapse
Announcement
Collapse
No announcement yet.
System Sentinel: Moving to an Exclusionary Access Control Model, Part 2
Collapse
X
-
Guest replied
-
System Sentinel: Moving to an Exclusionary Access Control Model, Part 2
** This thread discusses the article: System Sentinel: Moving to an Exclusionary Access Control Model, Part 2 **
** This thread discusses the Content article: System Sentinel: Moving to an Exclusionary Access Control Model, Part 2 **
0Tags: None
Leave a comment: