O'Reilly logo

DB2® 9 for Linux®, UNIX®, and Windows®: DBA Guide, Reference, and Exam Prep, Sixth Edition by Paul C. Zikopoulos, George Baklarz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Controlling Data Access

• AUTHENTICATING USERS

• BUILT-IN AUTHORITY ROLES

• ASSIGNING AUTHORITIES

• ASSIGNING PRIVILEGES

• USERS AND GROUPS

• AUDIT FACILITY

Security is an important consideration whenever data is stored in a relational database management system. In this chapter, we discuss controlling data access using many different methods. Access to data within DB2 is controlled at many levels, including instance, database, database object, application package, rows, columns, and more. This chapter includes an overview of how authentication and authorization are managed in DB2—two key components to building a secure data server. In addition, assigning group rights and privileges for groups of typical database users, such as database ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required