Skip to main content

Does DBU software program's allow users to adopt authority and modify objects that they are not authorized to?


DBU conforms to the object level security that is part of the IBM i/iSeries/AS400. DBU software does not have programs that use adopted authority, which would allow the object level security to be circumvented by a user.

Last update:
2016-10-17 22:09
Author:
Kathy Stolzenburg
Revision:
1.1
Average rating:0 (0 Votes)

You cannot comment on this entry