Security

A relational database management system needs to control access to instances, databases, objects, and application packages. The two steps in controlling access are authentication and authorization. Authentication occurs when you provide a user ID and password. The password is used to prove your identity. Authorization occurs when the database verifies that you are allowed to perform a certain action. Typical actions include accessing, modifying, and deleting database objects.

Authentication

Authentication is required when connecting to a database or attaching to a database instance. A user ID is needed to uniquely identify a user. A password, known only to the user, is provided to validate the user's identity. The user ID is mapped to ...

Get DB2® Universal Database™ v8 Application Development Certification Guide, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.