This section describes the commands available for granting and revoking authority to the replication control tables: Granting authority and Revoking authority.
The Grant DPR Authority (GRTDPRAUT) command authorizes a list of users to the replication control tables, so that the users can run the Capture and Apply programs. The GRTDPRAUT command compensates for the different authority requirements for DPROPR/400. For example, the authority requirements for the user who is running the Capture and Apply programs might differ from the authority requirements for the user who defines replication sources and targets.
You must have *ALLOBJ authority to grant authorities.
>>-GRTDPRAUT---USER(--+---user-name---+---)---------------------> '-*PUBLIC-------' .-1--. >----AUT(--+-*REGISTRAR--+---)---DPRVSN(--+-5--+---)------------> +-*SUBSCRIBER-+ +-*CAPTURE----+ '-*APPLY------' .-*ALL------------. >----APYQUAL(--+-*USER-----------+---)------------------------->< '-apply-qualifier-'
Table 14. GRTDPRAUT Command Parameter Definitions for AS/400
Parameter | Definition and Prompts |
---|---|
USER | Specifies the users who have authority.
|
AUT | Specifies the type of DPROPR/400 authority being granted.
|
DPRVSN | Specifies the version of DPROPR/400. You can specify one or both
of the version levels.
|
APYQUAL | Specifies the Apply qualifier to be used by the user specified with the
USER parameter. This parameter is used only when AUT(*APPLY) or
AUT(*SUBSCRIBER) is specified.
|
You cannot use the GRTDPRAUT command while the Capture or Apply programs are running, or when applications that use the source tables are active because authorizations cannot be changed on files that are in use.
Example 1: To authorize user USER1 to define and modify replication sources:
GRTDPRAUT USER(USER1) AUT(*REGISTRAR) DPRVSN(5)
Example 2: To authorize user USER1 to define and modify subscriptions:
GRTDPRAUT USER(USER1) AUT(*SUBSCRIBER) DPRVSN(5)
Example 3: To authorize user USER1 to define and modify existing subscriptions associated with Apply qualifier A1:
GRTDPRAUT USER(USER1) AUT(*SUBSCRIBER) DPRVSN(5) APYQUAL(A1)
Example 4: To authorize a user to run the Apply program on the control server system for all subscriptions associated with Apply qualifier A1, where the target server is the same as the control server:
GRTDPRAUT USER(USER1) AUT(*APPLY) DPRVSN(5) APYQUAL(A1)
GRTDPRAUT USER(USER1) AUT(*APPLY) DPRVSN(5) APYQUAL(A1)
If the application server job on the source server used by the Apply program runs under a different user profile; for example, QUSER, the command is:
GRTDPRAUT USER(QUSER) AUT(*APPLY) DPRVSN(5) APYQUAL(A1)
The following tables list the authorities granted when you specify:
on the GRTDPRAUT command.
The following table lists the authorities granted when you specify the
AUT(*REGISTRAR) parameter on the GRTDPRAUT command:
Table 15. Authorities granted with GRTDPRAUT AUT(*REGISTRAR)
Library | Object | Type | Version | Authorizations |
---|---|---|---|---|
QSYS | ASN | *LIB | 1 5 | *USE, *ADD |
ASN | QSQJRN | *JRN | 1 5 | *OBJOPR, *OBJMGT |
ASN | IBMSNAP_REGISTER | *FILE | 5 | *OBJOPR, *READ, *ADD, *UPD, *DLT |
ASN | IBMSNAP_REGISTERX | *FILE | 5 | *OBJOPR, *READ, *ADD, *UPD, *DLT |
ASN | IBMSNAP_REG_EXT | *FILE | 1 5 | *OBJOPR, *OBJMGT, *READ, *ADD, *UPD, *DLT |
ASN | IBMSNAP_REG_EXTX | *FILE | 1 5 | *OBJOPR, *OBJMGT, *READ, *ADD, *UPD, *DLT |
ASN | IBMSNAP_UOW | *FILE | 1 5 | *OBJOPR, *OBJMGT, *READ, *ADD *DLT |
ASN | IBMSNAP_UOW_IDX | *FILE | 1 5 | *OBJOPR, *OBJMGT, *READ, *ADD, *DLT |
ASN | IBMSNAP_PRUNCNTL | *FILE | 5 | *OBJOPR, *READ |
ASN | IBMSNAP_CCPPARMS | *FILE | 1 5 | *OBJOPR, *READ, *UPD |
ASN | QZSNCTLBLK | *USRSPC | 1 5 | *CHANGE |
ASN | ASN4B* | *SQLPKG | 5 | *USE |
ASN | ASN4C* | *SQLPKG | 5 | *USE |
QSYS | Source library | *LIB | 1 5 | *USE |
Source library | Source table | *FILE | 1 5 | *OBJOPR, *READ |
QSYS | Control library | *LIB | 1 5 | *USE, *ADD |
Control library | CDtimestamp - CD table | *FILE | 5 | *USE, *OBJMGT, *OBJEXIST |
The following table lists the authorities granted when you specify the
AUT(*SUBSCRIBER) parameter on the GRTDPRAUT command:
Table 16. Authorities granted with GRTDPRAUT AUT(*SUBSCRIBER)
Library | Object | Type | Version | Authorizations |
---|---|---|---|---|
QSYS | ASN | *LIB | 5 | *USE, *ADD |
QSYS | IBMSNAP_SUBS_SET | *FILE | 5 | *CHANGE |
ASN | IBMSNAP_APPLYTRAIL | *FILE | 5 | *CHANGE |
ASN | IBMSNAP_SUBS_COL | *FILE | 5 | *CHANGE |
ASN | IBMSNAP_SUBS_EVENT | *FILE | 5 | *CHANGE |
ASN | IBMSNAP_SUBS_STMTS | *FILE | 5 | *CHANGE |
ASN | IBMSNAP_SUBS_MEMBR | *FILE | 5 | *CHANGE |
ASN | IBMSNAP_REGISTER | *FILE | 5 | *USE, *UPD |
ASN | IBMSNAP_REG_EXT | *FILE | 1 5 | *USE, *UPD |
ASN | IBMSNAP_PRUNCNTL | *FILE | 5 | *USE, *ADD, *DLT |
ASN | ASN4U* | *SQLPKG | 5 | *USE |
ASN | ASN4A* | *SQLPKG | 5 | *USE |
QSYS | Source library | *LIB | 1 5 | *USE |
Source library | Source table | *FILE | 1 5 | *OBJOPR, *READ |
QSYS | Control library | *LIB | 5 | *USE |
Control library | ASNtimestampPC - pruning control table | *LIB | 5 | *USE |
Control library | CD table | *FILE | 1 5 | *OBJOPR, *READ |
Control library | Internal CCD table | *FILE | 1 5 | *OBJOPR, *READ |
QSYS | Target library | *LIB | 5 | *USE, *ADD |
Target library | Target table | *FILE | 5 | *USE, *OBJMGT, *OBJEXIST |
The following table lists the authorities granted when you specify the
AUT(*CAPTURE) parameter on the GRTDPRAUT command:
Table 17. Authorities granted with GRTDPRAUT AUT(*CAPTURE)
Library | Object | Type | Version | Authorizations |
---|---|---|---|---|
QSYS | ASN | *LIB | 1 5 | *USE, *OBJMGT |
ASN | IBMSNAP_REGISTER | *FILE | 1 5 | *USE, *UPD |
ASN | IBMSNAP_REG_EXT | *FILE | 1 5 | *USE, *UPD |
QSYS | Control library | *LIB | 1 5 | *USE |
Control library | CD table | *FILE | 1 5 | *OBJOPR, *OBJMGT, *READ, *UPD, *DLT, *ADD |
Control library | CD table | *FILE | 1 5 | *OBJOPR, *OBJMGT, *READ, *UPD, *DLT, *ADD |
ASN | IBMSNAP_PRUNCNTL | *FILE | 5 | *USE, *UPD |
ASN | IBMSNAP_CRITSEC | *FILE | 5 | *USE |
ASN | IBMSNAP_CCPPARMS | *FILE | 1 5 | *USE |
ASN | IBMSNAP_UOW | *FILE | 1 5 | *CHANGE |
ASN | IBMSNAP_TRACE | *FILE | 5 | *CHANGE |
ASN | IBMSNAP_WARM_START | *FILE | 5 | *CHANGE |
ASN | IBMSNAP_AUTHTKN | *FILE | 5 | *CHANGE |
ASN | QZSBCTKBLK | *USRSPC | 1 5 | *CHANGE |
ASN | ASNB* | SQLPKG | 5 | *USE |
ASN | ASNC* | SQLPKG | 5 | *USE |
The following table lists the authorities granted when you specify the
AUT(*APPLY) parameter on the GRTDPRAUT command:
Table 18. Authorities granted with GRTDPRAUT AUT(*APPLY)
Library | Object | Type | Version | Authorizations |
---|---|---|---|---|
QSYS | ASN | *LIB | 1 5 | *USE |
ASN | IBMSNAP_SUBS_SET | *FILE | 5 | *CHANGE |
ASN | IBMSNAP_APPLYTRAIL | *FILE | 5 | *CHANGE |
ASN | IBMSNAP_SUBS_COLS | *FILE | 5 | *USE |
ASN | IBMSNAP_SUBS_EVENT | *FILE | 5 | *USE |
ASN | IBMSNAP_SUBS_STMTS | *FILE | 5 | *USE |
ASN | IBMSNAP_SUBS_MEMBR | *FILE | 5 | *USE |
ASN | ASNA* | *SQLPKG | 5 | *USE |
ASN | ASNU* | *SQLPKG | 5 | *USE |
ASN | IBMSNAP_REGISTER | *FILE | 5 | *USE, *UPD |
ASN | IBMSNAP_REG_EXT | *FILE | 1 5 | *USE, *UPD |
ASN | IBMSNAP_UOW | *FILE | 1 5 | *USE, *UPD |
ASN | IBMSNAP_PRUNCNTL | *FILE | 5 | *USE, *UPD, *ADD |
ASN | IBMSNAP_CRITSEC | *FILE | 5 | *USE, *ADD |
ASN | IBMSNAP_AUTHTKN | *FILE | 5 | *USE, *ADD |
QSYS | Control library | *LIB | 1 5 | *USE |
Control library | CD table | *FILE | 1 5 | *USE |
QSYS | Target library | *LIB | 5 | *USE |
Target library | Target table | *FILE | 5 | *CHANGE, *OBJMGT |
The Revoke DPR Authority (RVKDPRAUT) command revokes authority to the replication control tables so that users can no longer define or modify replication sources and subscriptions.
.----------------. V | .-1--. >>-RVKDPRAUT--USER(--+------user-name----+-+---)---DPRVSN(--+-5--+---)--> '-*PUBLIC-------------' >--------------------------------------------------------------><
The command returns an error message if any of the following conditions occur:
Table 19. RVKDPRAUT Command Parameter Definitions for AS/400
Parameter | Definition and Prompts |
---|---|
USER | Specifies the users whose authority is revoked.
|
DPRVSN | Specifies the version of DPROPR/400. You can specify one or both
of the version levels.
|
To revoke authorities to the control tables:
RVKDPRAUT USER(user-name) DPRVSN(5)