Chapter 10. Securing Data in DB2
You've seen how DB2 authentication determines who you are, and to which instances and databases you have access. You've looked at the special authorities vested in
SYSADM, SYSMAINT, and others. But what about day-to-day access to normal data, and common privileges such as the ability to create tables, run SQL statements that change what's stored in the database, and so on?
Managing Authorities and Privileges in DB2
In DB2, this third area of securing the database and its contents is the domain of database and object privileges, and they control most of the activities you'd expect when a user tries to select, update, insert, and delete data; as well as perform common management tasks on database objects such as tables, ...