User profiles are fundamental to security on AS400 (now IBM i). They define who can access the system and what they can do. Here's a breakdown of how to create and manage them:
1. Creating User Profiles
CRTUSRPRF Command: The primary way to create a user profile is with the CRTUSRPRF
command. You'll need security administrator (*SECADM) or security officer (*SECOFR) special authority to do this.
CRTUSRPRF USRPRF(username) PASSWORD(password) USRCLS(userclass) ...
USRPRF
: The name of the user profile (e.g., SMITHJ).PASSWORD
: The user's initial password.USRCLS
: The user class (e.g., *USER, *PGMR, *SYSOPR, *SECADM, *SECOFR). This determines their base level of authority.WRKUSRPRF Command: You can also create a user profile using the WRKUSRPRF
command. This provides a menu-driven interface to work with user profiles.
2. Managing User Profiles
CHGUSRPRF Command: Use the CHGUSRPRF
command to modify existing user profiles. You can change passwords, user class, library lists, and other attributes.
CHGUSRPRF USRPRF(username) PASSWORD(newpassword) ...
DSPUSRPRF Command: The DSPUSRPRF
command displays the details of a user profile.
DSPUSRPRF USRPRF(username)
DLTUSRPRF Command: Use the DLTUSRPRF
command to delete a user profile.
DLTUSRPRF USRPRF(username)
WRKUSRPRF Command: As mentioned earlier, WRKUSRPRF
provides a menu-driven interface to work with user profiles. You can use it to create, change, display, copy, or delete user profiles.
3. Key Concepts
User Classes: AS400 has predefined user classes that represent different levels of authority:
*USER
: Basic user with limited access.*PGMR
: Programmer with authority to develop and test programs.*SYSOPR
: System operator with authority to manage system operations.*SECADM
: Security administrator with authority to manage system security.*SECOFR
: Security officer with the highest level of authority.Special Authorities: In addition to user class, you can grant specific special authorities to a user profile. These authorities allow users to perform specific tasks, such as managing objects, controlling jobs, or auditing security events.
Object Authority: User profiles are granted authority to access and manipulate objects (files, programs, etc.). You can grant different levels of authority, such as *READ, *UPDATE, *DELETE, *EXECUTE, and *ALL.
Group Profiles: You can create group profiles to group users together and grant them common authorities. This simplifies user management.
4. Security Best Practices