Correct.  Somebody has 'broken' the production system by having done 
CHGOBJOWN QUSRSYS/QAUGDBLL *FILE TECH_SUPPORT CUROWNAUT(*REVOKE).  The 
QAUTPROF user profile is a system profile that maintains authority for 
the availability of users to access features of OpsNav; a form of 
application authority.  When that user does not have the authority to a 
functional object, the users without *ALLOBJ special authority will not 
be able to access the function represented or performed by that object.
  The user profile is shipped as *USER [what I call *PEON] and provides 
adopted authority [primarily to QUSRSYS *LIB] to be able to access some 
 functions & objects without adopting a user profile with *ALLOBJ; that 
would be excessive.  On most systems DSPUSRPRF QAUTPROF *OBJAUT will 
show only *CHANGE to QUSRSYS *LIB, and aut to itself.  And DSPUSRPRF 
QAUTPROF *OBJOWN will show several programs QZDGD* in QIWS and several 
database files QAUGD* in QUSRSYS.  FWiW: It is possible the change was 
in response to output from DSPPGMADP QAUTPROF, without regard to 
consequences -- but again, that is a *PEON user, so when it is adopting, 
it should gain nothing except to what it owns or to what it is 
explicitly authorized.
  The object QAUGDBLL is the current implementation object [as an 
implementation detail, is subject to change] for the Database component 
of OpsNav, for the library list feature.
  Although I do not agree with the design approach taken by the GUI dev 
[by coding only from the client to create and store the data in a DBF on 
the server versus having underlying i5/OS install support to create the 
files during install vs run-time // or if it is even necessary or any 
value-add to store on the server vs the client for this particular 
function], the authority will be necessary to use the function.  And the 
change made to the file owner, with the revoking of the current 
authority, will have caused the same problem even if the files had been 
installed versus created by the GUI component.
  The authority to the file must come from either the user of the 
function, or the adopting user QAUTPROF.  So with regard to the 
situation probably requiring "an act of Congress to get our sysadmins to 
do anything about this," you will probably want to start your petition 
for change to congress. ;-)
  Given exclusionary authority established on the server, then I am not 
aware of any integrity concern for allowing the user to set their own 
library list.  And if the user changing their library list is supported 
generally, I would expect that would be desirable for Database OpsNav 
users as well.  So if the situation is explained, that the i5/OS GUI is 
broken [for the database feature] due to the revoked authority to that 
file for the user QAUTPROF, hopefully the sysadmins will understand and 
correct that error without too much of a fight.?
  Irrespective of any possible consequences for having changed the 
authority, I see relatively little possible chance for a negative 
outcome due to the ownership change.  Noting however, that as a 
customization, it would need to be performed as part of system 
maintenance as part of system change management to maintain consistency 
if that is really desirable.  Nothing prevents the system from reverting 
the file owner and authority during an install (of maintenance even) or 
upgrade.
Regards, Chuck
-- All comments provided "as is" with no warranties of any kind 
whatsoever and may not represent positions, strategies, nor views of my 
employer
Dan wrote:
<SNIP>>
The production box, otoh, shows that it was intentionally modified:
Object . . . . . . . :   QAUGDBLL        Owner  . . . . . . . :   TECH_SUPPT
  Library  . . . . . :     QUSRSYS       Primary group  . . . :   *NONE
Object type  . . . . :   *FILE           ASP device . . . . . :   *SYSBAS
                         Object
User        Group       Authority
*PUBLIC                 *USE
Chuck, since you are familiar with this file and process, are you aware of
any reasons why this particular file should be locked down?  I mean, it's a
glorified library list!!!!!!!  Is there a security vulnerability?
- Dan
As an Amazon Associate we earn from qualifying purchases.