Chapter 8. Implementing Security
All tasks and concepts presented in the previous chapters assumed you had the administrative rights, or privileges, to set up client and server connectivity, execute SQL statements, create database objects, and so on. In the real world, administrative rights are typically given only to selected individuals. In addition, the privileges for users to access data must be controlled to comply with business and regulatory requirements. DB2 uses a number of components to support various security schemes. This chapter discusses each of the security components and provides examples to illustrate different implementation scenarios.
In this chapter, you learn about
Get DB2 Essentials: Understanding DB2 in a Big Data World, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.