Chapter 7. Ensuring Data Security
Three security levels control access to DB2 Universal Database data and functions. The first level of security checking is authentication, where the operating system verifies a user through a user ID and password. Once authenticated by the operating system, authorization is the next level of security where the user must be identified to DB2 using a SQL authorization name or authid. The authid can also be the same as the user ID and is normally used for identifying users to maintain the database and instances. Finally, privileges are rights granted to users to work with objects within a database, such as a view or table.
Today you will learn the following:
How to use authentication types to determine where and how ...