O'Reilly logo

Sams Teach Yourself DB2® Universal Database™ in 21 Days, Second Edition by Susan Visser, Bill Wong

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7. Ensuring Data Security

Three security levels control access to DB2 Universal Database data and functions. The first level of security checking is authentication, where the operating system verifies a user through a user ID and password. Once authenticated by the operating system, authorization is the next level of security where the user must be identified to DB2 using a SQL authorization name or authid. The authid can also be the same as the user ID and is normally used for identifying users to maintain the database and instances. Finally, privileges are rights granted to users to work with objects within a database, such as a view or table.

Today you will learn the following:

  • How to use authentication types to determine where and how ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required