Removing the user from the Authorization list

Posted on 2009-04-24
Last Modified: 2012-05-06
Dear Team,

I am accepting that using RVKOBJAUT , it is possible to revoke the access of the objects.
But what we are trying to vanish the line from Authorization list itself.
Is it possibe? If means how to do it?
user                             Object Authority
Amutha                          *exclude

I want to delete this line from the Authorization list itself.
If it is possible means, tell  us how to do?

bsid team
Question by:Bsidmis
    LVL 14

    Expert Comment

    you can use the RMVAUTLE command

    LVL 4

    Expert Comment

    Hi Bsidmis,

    -Do a WRKOBJLCK on the file. If nobody is using it you can modifiy the authority.
    -Do a WRKOBJ on the file CLMPF/BAILBRP and option 2. Just remove *all in the Object Authority and hit enter.

    LVL 13

    Expert Comment


    To remove the user from this screen, you have to blank out all of the authority columns. You will need to press F11 to blank out all of these. When they are all blanked out, the user is removed from this list.

    LVL 34

    Accepted Solution

    An "authorization list" has a specific security meaning on the AS/400.  It is not correct to use the term the way you are using it, and it will get you confusing responses.  Use "object authority list" to refer to the rights granted directly to users or groups for a given object.

    An "authorization list" is a seperate object of type *AUTL that allows you to use a list of authorities for multiple objects.

    As I outlined in your other question, to drop user AMUTHA, who currently has *EXCLUDE rights from the object authority list on a given object, you will need to obtain an exclusive lock on the object, and then execute the following command:

    RVKOBJAUT OJB(lib/object) TYPE(*type) USER(aumtha) AUT(*exclude)

    - Gary Patterson

    Author Closing Comment

    We got the solution, since because the objects are in lck we are unable to do the authorities. Now we got that,... thank you for the right soln.
    LVL 34

    Expert Comment

    by:Gary Patterson
    Happy to help!

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    Join & Write a Comment

    In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
    Basic understanding on "OO- Object Orientation" is needed for designing a logical solution to solve a problem. Basic OOAD is a prerequisite for a coder to ensure that they follow the basic design of OO. This would help developers to understand the b…
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now