Question:
There are Security Privileges in the IDMS security catalog held by USERs that no longer exist. How does this happen and how can we get rid of these "orphaned" privileges?
Release: 19.0
Component:
As documented in Security Administration manual under the Usage section of the DROP USER chapter, dropping a USER is a three step process. The same process is described for DROP GROUP.
Answer:
As documented in Security Administration manual under the Usage section of the DROP USER chapter, dropping a USER is a three step process. The same process is described for DROP GROUP.
The first time you issue a DROP USER/GROUP statement for a user or group identifier, the identifier is flagged for logical deletion. Executing the SDEL task, in each system of the domain and against each dictionary in the system that contains security definitions, deletes all privileges associated with each logically deleted user or group. Then you reissue the DROP USER/GROUP statement to physically delete the user or group from the user catalog.
If you issue the second 'DROP USER/GROUP' command before before running SDEL on all systems, all privileges associated with the user or group will remain, even though the user or group definition has been deleted.
If you subsequently re-add the same USER or GROUP for a new user or group, it will have all the privileges that were granted to the original user or group. This will most likely not be desired.
For example:
A drop user statement was issued twice on USERA, but the SDEL task was not executed in between those two drop user statements. Hence the user identification for USERA was deleted from the user catalog, but the privileges granted to USERA remain.
For example: DISPLAY USER USERA; shows the user is not defined, but holds EXECUTE privilege on a Resource Category.
If you physically delete a user before running SDEL on all systems, follow these steps to correct the situation:
Additional Information: