Chapter 4. Controlling Data Access

• AUTHENTICATING USERS

• BUILT-IN AUTHORITY ROLES

• ASSIGNING AUTHORITIES

• ASSIGNING PRIVILEGES

• USERS AND GROUPS

• AUDIT FACILITY

Security is an important consideration whenever data is stored in a relational database management system. In this chapter, we discuss controlling data access using many different methods. Access to data within DB2 is controlled at many levels, including instance, database, database object, application package, rows, columns, and more. This chapter includes an overview of how authentication and authorization are managed in DB2—two key components to building a secure data server. In addition, assigning group rights and privileges for groups of typical database users, such as database ...

Get DB2® 9 for Linux®, UNIX®, and Windows®: DBA Guide, Reference, and Exam Prep, Sixth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.