Summary

This chapter discussed a number of topics relating to accessing data. We discussed security with the subsystem, with data sets, and then within DB2. Subsystem security is handled in a number of ways such as via IMS, CICS, and Kerberos and RACF.

Securing access at the data set level also needs to be considered in some situations since DB2 stores its data into individual data sets that can be accessed outside of DB2.

We talked about authorization IDs, primary and secondary, and how they are assigned.

We talked about several of the authorization levels within DB2: SYSADM, SYSCNTL, DBADM, DBCNTL, PACKADM, etc. We took a look at the types of privileges each one of these different authorities possesses. Ownership of objects also comes with ...

Get DB2® Universal Database for OS/390® Version 7.1 Certification Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.