O'Reilly logo

Understanding DB2® 9 Security: DB2® Information Management Software by Yuk-Kuen Henry Chan, Carmen Ka Man Wong, Kevin Yeung-Kuen See, Rebecca Bond

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Authorization—Authority and Privileges

I have the authority, and it would be my privilege, to authorize your entry into the realm of DB2 security.

First Words

Remember the house in Chapter 3, “Understanding Identification and Authentication—The First Line of Defense”? We talked about the lock on the front door of the house as the first line of defense, just like authentication is the first line of defense for database security. What if each door inside the house had a lock, too? Locking individual rooms can be considered a second line of defense and is fundamental to a “defense-in-depth” security approach.

In this analogy, each room’s lock represents an authorization requirement that determines whether an individual has the right ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required