Skip to Main Content
DB2 Essentials: Understanding DB2 in a Big Data World, Third Edition
book

DB2 Essentials: Understanding DB2 in a Big Data World, Third Edition

by Raul F. Chong, Clara Liu
October 2013
Beginner to intermediate content levelBeginner to intermediate
784 pages
20h 55m
English
IBM Press
Content preview from DB2 Essentials: Understanding DB2 in a Big Data World, Third Edition

Chapter 8. Implementing Security

All tasks and concepts presented in the previous chapters assumed you had the administrative rights, or privileges, to set up client and server connectivity, execute SQL statements, create database objects, and so on. In the real world, administrative rights are typically given only to selected individuals. In addition, the privileges for users to access data must be controlled to comply with business and regulatory requirements. DB2 uses a number of components to support various security schemes. This chapter discusses each of the security components and provides examples to illustrate different implementation scenarios.

In this chapter, you learn about

DB2 authentication methods

Administrative authorities ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

SQL for Data Analysis

SQL for Data Analysis

Cathy Tanimura
Oracle DBA Fundamentals

Oracle DBA Fundamentals

Robert G. Freeman

Publisher Resources

ISBN: 9780133461930Purchase book