Does DBU software program's allow users to adopt authority and modify objects that they are not authorized to?
DBU conforms to the object level security that is part of the IBM i/iSeries/AS400. DBU software does not have programs that use adopted authority, which would allow the object level security to be circumvented by a user.