Carol describes security considerations one should make when deciding which profile will own IBM i objects.
By Carol Woodbury
We seem to always focus on the *PUBLIC authority of objects and whether they’re secured with an authorization list. But little is said about ownership. I thought you might find a brief tutorial and considerations that you’ll want to make helpful.