Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved


Chapter 3 Tools : SEC_REBIND

SEC_REBIND
Rebinds all security data previously bound in the Execution Environment storage. (C)
Invocation
CALL SEC_REBIND(object, parmcat, name)
The three arguments are not currently used and are reserved for future enhancements. Use an empty string ('') for the values.
If you access the Execution Environment in question through an OSB UI session, in order to pick up the rebound security data, be sure to also close and restart that OSB project after SEC_REBIND has been run.
In a multi-user environment, all users are impacted after the tool is executed. They could experience performance degradation since all bound data must be rebuilt.
Usage Notes
This tool is invoked by a level 7 user to make the latest security changes effective.
Example
The following example illustrates a situation where SEC_REBIND is used.
A user is initially prevented from accessing a particular table. When the user performs a GET on the table, a security fail exception results. A security administrator is required to grant the permissions to the table to the user. Since the old security data (the user being prevented from accessing the table) was bound, the user must execute a rule that calls SEC_REBIND('', '', '') to remove the old bound security data.

Copyright © Cloud Software Group, Inc. All Rights Reserved
Copyright © Cloud Software Group, Inc. All Rights Reserved