O'Reilly logo

Understanding DB2®: Learning Visually with Examples, Second Edition by Dwaine R. Snow, Michael Dang, Xiaomei Wang, Raul F. Chong

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11. Implementing Security

All tasks and concepts presented in the previous chapters assumed you had the administrative rights, or privileges, to set up client and server connectivity, execute SQL statements, create database objects, and so on. In the real world, administrative rights are typically given only to selected individuals. In addition, the ability for users to access data (i.e., privileges) must be controlled in order to comply with business and regulatory requirements. DB2 uses a number of components to support various security schemes. This chapter discusses each of the security components and provides examples to illustrate different implementation scenarios.

In this chapter you will learn about:

  • The big picture of the DB2 security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required