Chapter 3. Controlling Data Access

  • Subsystem Access

  • Data Set Protection

  • Authorization IDs

  • Authorizations and Privileges

  • Auditing

Security is an important consideration whenever data is stored in a relational database management system. In this chapter, we discuss controlling data access using many different methods. Access to data within DB2 is controlled at many levels, including subsystem, database objects, and application plan/packages. The topics of authentication of user IDs and passwords are discussed. We configure groups of typical database users such as database administrators, system administrators, transactional processing personnel, and decision support users. Each of these database user types may require different access privileges. ...

Get DB2® Universal Database for OS/390® Version 7.1 Certification Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.