DBU conforms to the object level security that is part of the IBM i/iSeries/AS400. DBU software does not have programs that use adopted authority, which would allow the object level security to be circumvented by a user.
DBU conforms to the object level security that is part of the IBM i/iSeries/AS400. DBU software does not have programs that use adopted authority, which would allow the object level security to be circumvented by a user.
You cannot comment on this entry
powered by phpMyFAQ 2.8.29