Appendix E. Security Considerations in SQL Procedures
Controlling access to the information stored in a database is a key requirement for almost all database implementations. DB2 offers database administrators a number of options on how they can control the access, creation, and manipulation of data in their systems. These privileges range from being allowed to read from a table using a SELECT
statement to restricting users from creating new tables.
Stored procedures can perform a wide range of operations, including working with data and executing DDL. When building the procedures, it is important to consider who will need to be able to execute the procedures and what level of privileges they will need. It is also important to understand what is ...
Get DB2® SQL PL: Essential Guide for DB2® UDB on Linux™, UNIX®, Windows®, i5/OS™, and z/OS®, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.