Chapter 10. Securing Data in DB2
You've seen how DB2 authentication determines who you are, and to which instances and databases you have access. You've looked at the special authorities vested in SYSADM, SYSMAINT
, and others. But what about day-to-day access to normal data, and common privileges such as the ability to create tables, run SQL statements that change what's stored in the database, and so on?
Managing Authorities and Privileges in DB2
In DB2, this third area of securing the database and its contents is the domain of database and object privileges, and they control most of the activities you'd expect when a user tries to select, update, insert, and delete data; as well as perform common management tasks on database objects such as tables, ...
Get Beginning DB2: From Novice to Professional now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.