Skip to Main Content
DB2® for z/OS® Version 8 DBA Certification Guide
book

DB2® for z/OS® Version 8 DBA Certification Guide

by Susan Lawson
October 2004
Intermediate to advanced content levelIntermediate to advanced
688 pages
16h 35m
English
IBM Press
Content preview from DB2® for z/OS® Version 8 DBA Certification Guide

Chapter 3. DB2 Access and Security

• Subsystem access

• Data set protection

• Access to DB2 objects

• Multilevel security

• Auditing

Security is an important consideration whenever data is stored in a relational database management system. This chapter discusses various methods of controlling data access. Access to data within DB2 is controlled at many levels, including subsystem, database objects, and application plan/packages. Authentication of user IDs and passwords is discussed. Groups of typical database users, such as database administrators, system administrators, transactional processing personnel, and decision support users are configured. Each of these database user types may require different access privileges. Another topic discussed ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

DB2® Universal Database for OS/390® Version 7.1 Certification Guide

DB2® Universal Database for OS/390® Version 7.1 Certification Guide

Richard Yevich, Susan Lawson
Security Functions of IBM DB2 10 for z/OS

Security Functions of IBM DB2 10 for z/OS

Paolo Bruni, Marcelo Antonelli, Hyun Baek, Rick Butler, Ernie Mancill
Managing DB2 for z/OS Utilities with DB2 Tools Solution Packs

Managing DB2 for z/OS Utilities with DB2 Tools Solution Packs

Paolo Bruni, Carlos Alberto Gomes da Silva Junior, Craig McKellar, Adilet Sabyrbaev, Tim Willging

Publisher Resources

ISBN: 0131491202Purchase book