Skip to content
  • Articles
  • About API – my my

Articles on Apis

APIs by Example

Written by Carsten FlensburgJune 1, 2005August 26, 2017

Print Program Adoption Supercharged!

Program Adoption of Authority (PAA) is a technique that you can use to temporarily elevate users’ authorities so that the users can perform functions that they would usually have insufficient authority to do. For example, you want the help desk folks to be able to reset a user’s password. To do this sensitive function, the help desk personnel would need high authority levels (e.g., *ALLOBJ, *SECADM). But if you assign these high authority levels to the help desk staff’s user profiles, these users then have full-time power to all your sensitive data, and this is dangerous to the system’s overall integrity.
What you need to do instead is provide a small, limited-function program that such users can run to adopt the powerful authority that they need to do the password reset. When the adopting program runs to completion, the elevated level of authority is removed. This is what PAA does.

PAA is a useful function that you shouldn’t shy away from. However, in the wrong hands, PAA can be the back door for obtaining high levels of authority without proper oversight and control.

In my work doing OS/400 vulnerability assessments, I’ve encountered many instances in which a program that adopts a high level of authority has been surreptitiously created on the system and used as a method to “back door” otherwise well-planned security. Using one of these adopting programs, a technical user can easily adopt a powerful user’s authority, such as QSECOFR, and virtually become QSECOFR anytime he or she likes.

Download the save file containing the source code.

Read the entire article

Share this:

  • Twitter
  • Facebook

Like this:

Like Loading...
Posted in Programs, Security, Systems management, User profile.

Leave a Reply Cancel reply

Fill in your details below or click an icon to log in:

Gravatar
WordPress.com Logo

You are commenting using your WordPress.com account. ( Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. ( Log Out /  Change )

Cancel

Connecting to %s

Archives

Category

API usage Application modernization Commands Cross reference Cryptographic services Database file Data queue Date and time Digital certificate manager Display file Document conversion DSM eBook Environment variables Exit points Hardware Help panel IFS Job Job accounting Job queue Job scheduler Job screen Journal LAN Locales Messages MI Module information NetServer Object Object authority Object locks Output queue PEX Printer Programs PTF Query Retrive journal entries RPG Save & restore Security SMTP Spooled files SQL Subsystem Systems management TCP/IP Tips Track exports Trigger UIM User profile User spaces Validation lists Watch definition Workload capping groups Work management XML ZIP

Blogroll

  • Scott Klement's site
  • Dan Riehl's site
  • Lillian Boutté
  • Anette Harboe Flensburg
  • Eamon O'Kane

Post navigation

Previous Post APIs by Example: Retrieve ASP Information, Part 1
Next Post Easily Reenable Disabled NetServer Users
Create a free website or blog at WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Articles on Apis
    • Already have a WordPress.com account? Log in now.
    • Articles on Apis
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Copy shortlink
    • Report this content
    • View post in Reader
    • Manage subscriptions
    • Collapse this bar
%d bloggers like this: