Although an object can be carefully protected by an ACL and
a protection code, a user can still gain access through the use
of privilege or control access.
How Privileges Affect Protection Mechanisms Security administrators can assign privileges to users when
they create or modify user accounts. The system privileges READALL
and BYPASS affect user access, regardless of the access dictated
by an ACL for the object or by other elements in its security profile.
The privileges SYSPRV and GRPPRV are controlled through the system
category of the protection code. The privileges have the following
meanings:
BYPASS
A user with BYPASS privilege
receives all types of access to the object, regardless of its protection.
GRPPRV
A user with GRPPRV privilege
whose UIC group matches the group of the owner of the object receives
the same access accorded to users in the system category. Thus,
the user with GRPPRV privilege is able to manage any of the group's
objects.
READALL
A user with READALL privilege
receives read access to the object, even if that access is denied
by the ACL and the protection code. In addition, the user can receive
any other access granted through the protection code.
SYSPRV
A user with SYSPRV privilege receives
the access accorded to users in the system category.
When you define ACLs or protection codes for your objects,
remember that users with amplified privileges are entitled to special
access to objects throughout the system. For example, there is no
way to stop a user with the BYPASS privilege from accessing your
files. Users with GRPPRV privilege
have the power to perform many system management functions for other
members of their UIC group. Protection of your objects depends
on the judgment of your security administrator in granting these
privileges.
Using Control Access to Modify an Object
Profile Any user with control access to an object can change its protection
code and ACL and thereby gain access to an object. For all object
classes but files, control access also allows a user to modify the
object's owner. To modify the owner of a file generally requires
privilege (see
Types of Access).
You obtain control access in any of the following ways:
You hold an identifier to which the
object's ACL gives control access.
You have the same UIC as the owner of the object.
You qualify as a member of the system user category,
and the object has an owner with a nonzero UIC. For example, you
hold GRPPRV (with a matching group UIC) or SYSPRV. (Refer to
Controlling Access with Protection Codes for a full description
of system users.)
Object-Specific Access Considerations For some objects, access can be granted either by a special
privilege (beyond those listed in
How Privileges Affect Protection Mechanisms) or by an all-inclusive type of access. This is
particularly true of a queue. A user with operator (OPER) privilege
is granted all types of access to a queue. A user with manage access
implicitly possesses the three other types of queue access: read,
submit, and delete.
Descriptions of Object Classes lists
each object class with its access types and meanings and any special
privilege.