IFS Registry Authorization List

Within your applications, you may want to control if IFS files are available for each user to access, based on their authorities.  You can control this application-level security through IBM i Authorization Lists and Powertech Encryption for IBM i’s IFS Encryption Registry. 

Listed below is an example of the steps needed to create Authorization Lists and then associate them to a IFS in the IFS Encryption Registry:

  1. Create an IBM i Authorization List to control authority to DECRYPT values for IFS files.  Example:

    >  CRTAUTL AUTL(CCFULL) TEXT(‘Auth. List of Users allowed to decrypt’)

  2. For the CCDATA Authorization List, grant *USE authority only to those users (or user groups) that should have access to decrypt the values.  Example:

    >  EDTAUTL AUTL(CCDATA)