This section contains the following topics:
This guide describes how to secure the IBM DATABASE 2 (DB2) product using CA ACF2 Option for DB2.
This guide compares native DB2 security with CA ACF2 Option for DB2. It describes the features that replace DB2 internal security. It explains how CA ACF2 Option for DB2 helps you administer and maintain DB2 security. This guide is not intended to replace information that IBM provides with DB2. Its intent is only to summarize this information to the extent that it relates to CA ACF2 Option for DB2.
This guide also explains how to interpret CA ACF2™ Security for z/OS (CA ACF2) reports with CA ACF2 Option for DB2 information. To run CA ACF2 reports with CA ACF2 Option for DB2 information, you must use the CA ACF2 Security Reports and Utilities Guide. The CA ACF2 Reporting with CA Earl guide provides information about running CA Earl reports.
In this guide, you will learn how to:
Security administrators, database administrators (DBAs), and applications programmers should read this guide. Because CA ACF2 security administrators typically coordinate information security at a site and implement CA ACF2, this guide is critical reading for them. DBAs should read this guide to learn how CA ACF2 Option for DB2 relates to DB2 security concepts and what it means to them. Applications programmers should read “Comparing DB2 and CA ACF2 Option for DB2 Features,” to determine what resources they must access when they write DB2 programs.
After reading this guide, security administrators with even a limited knowledge of DB2 should be able to administer CA ACF2 Option for DB2 security, although additional DB2 education is beneficial. Programming experience is not necessary, but some data processing knowledge is helpful. An CA ACF2 Option for DB2 security administrator should have a conceptual understanding of the vocabulary and procedures necessary to administer CA ACF2. Inexperienced security administrators and DBAs can gain this understanding by reading the CA ACF2 General Information Guide. Experience administering CA ACF2 in a z/OS environment using ACF commands or ISPF panels is also helpful. CA ACF2 training classes are invaluable in providing the necessary education and background.
CA Technologies supplies the following publications related to CA ACF2 Option for DB2 and CA Common Services for z/OS (formerly known as Unicenter TNG Framework for OS/390 Common Services):
|
Name |
Contents |
|---|---|
|
CA ACF2 documentation set |
Contains guides that let you implement, administer, and customize CA ACF2 for z/OS. |
|
CA Common Services for z/OS Administrator Guide |
Provides operating instructions for CA Common Services for z/OS. |
|
CA Common Services for z/OS Getting Started |
Describes the installation procedure and installation JCL for CA Common Services for z/OS . |
|
CA Message Guide |
Provides messages and codes for CA Common Services for z/OS. |
|
CA Earl Reference Guide |
Provides detailed information about CA Earl statements, parameters, and coding rules. Also explains the CA Earl Reporting Service. |
|
CA Earl User Guide |
Presents an introduction to CA Earl features and capabilities. Designed for users interested in learning about CA Earl. |
|
CA Earl Systems Programmer Guide |
Lists the installation options for CA Earl and instructions for modifying them. Also describes size requirements and program execution. |
|
CA Earl Examples Guide |
Contains sample programs that show a variety of common applications. |
CA might refer to or recommend the following IBM publications:
|
Name |
Catalog Number |
|
IBM DATABASE 2 General Information |
GC26‑4373 |
|
IBM DATABASE 2 System and Database Administration Guide |
SC26‑4374 |
|
IBM DATABASE 2 Command and Utility Reference |
SC26‑4378 |
|
IBM DATABASE 2 SQL Reference |
SC26‑4380 |
|
IBM DATABASE 2 Messages and Codes |
SC26‑4379 |
This guide uses the following command notation.
Enter the following exactly as they appear in command descriptions:
|
Command Notation |
Description |
|---|---|
|
UPPERCASE |
Identifies commands, keywords, and keyword values that must be coded exactly as shown. |
|
MIXed Cases |
Identify command abbreviations. The uppercase letters are the minimum abbreviation; lowercase letters are optional. |
|
symbols |
All symbols such as commas, equal signs, and slashes must be coded exactly as shown. |
The following clarify command syntax; do not type these as they appear:
|
Command Notation |
Description |
|---|---|
|
italics |
Indicates that you must supply a substitution (a user‑supplied value). |
|
[ ] |
Identifies optional keywords or parameters. |
|
{ } |
Requires choosing one of the keywords or parameters listed. |
|
underlining |
Shows default values that need not be specified. |
|
| |
Separates alternative keywords or parameters; choose one. |
|
Ellipses (...) |
Mean the preceding items or group of items can be repeated more than once. |
|
- |
Continues a rule entry in an CA ACF2 Option for DB2 rule set. |
The following is an example of a sample command:
DEComp {*|ruleid|Like(ruleidmask)} [Into(dsname)]
where:
Command abbreviation
Required alternative keyword
Required alternative keyword
Required alternative keyword
Optional parameter
|
Copyright © 2011 CA Technologies.
All rights reserved.
|
|