Authorizing users to access data

Authorization is an integral part of controlling DB2. The security and authorization mechanisms that control access to DB2 data are both direct and indirect. DB2 performs direct security checks of user IDs and passwords before users gain access to a DB2 subsystem. DB2 security mechanisms include specific objects, privileges on those objects, and some privileges that provide broader authority. DB2 also controls data access indirectly with authorization checks at bind time and run time for application plans and packages.

You probably noticed references to authorization in previous chapters. For example, you must be authorized to run SQL statements that create and alter DB2 objects. Even when users run a SELECT statement ...

Get Official Introduction to DB2® for z/OS®, The, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.