O'Reilly logo

DB2® SQL PL: Essential Guide for DB2® UDB on Linux™, UNIX®, Windows®, i5/OS™, and z/OS®, Second Edition by Paul Yip, Fraser McArthur, Michael Gao, Raul Chong, Drew Bradstock, Clara Liu, Zamil Janmohamed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix E. Security Considerations in SQL Procedures

Controlling access to the information stored in a database is a key requirement for almost all database implementations. DB2 offers database administrators a number of options on how they can control the access, creation, and manipulation of data in their systems. These privileges range from being allowed to read from a table using a SELECT statement to restricting users from creating new tables.

Stored procedures can perform a wide range of operations, including working with data and executing DDL. When building the procedures, it is important to consider who will need to be able to execute the procedures and what level of privileges they will need. It is also important to understand what is ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required