O'Reilly logo

DB2® Universal Database™ v8 Application Development Certification Guide, 2nd Edition by Michael Kyprianou, Steve Sanyal, Kevin Gashyna, David Martineau

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Security

A relational database management system needs to control access to instances, databases, objects, and application packages. The two steps in controlling access are authentication and authorization. Authentication occurs when you provide a user ID and password. The password is used to prove your identity. Authorization occurs when the database verifies that you are allowed to perform a certain action. Typical actions include accessing, modifying, and deleting database objects.

Authentication

Authentication is required when connecting to a database or attaching to a database instance. A user ID is needed to uniquely identify a user. A password, known only to the user, is provided to validate the user's identity. The user ID is mapped to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required