Chapter 9. Controlling Access to DB2
It's time to discuss the topic of access control—or more formally how users are authenticated when trying to access DB2—and the mechanisms used to control who can connect to databases, who can attach to instances, and the baked-in powers available to special groups and users.
Like many other databases and many other software systems in general, the concepts of access security and privileges in DB2 are divided into two distinct areas. First, authentication is the process of determining that you are who you say you are when you attempt to perform a privileged action, such as connecting. Once authenticated, the second area of authorization determines what you can do.
This chapter deals with the first area, authentication, ...
Get Beginning DB2: From Novice to Professional now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.