Previous Topic: Documentation ChangesNext Topic: Overview


About This Guide

This section contains the following topics:

Purpose

Related Publications

Command Notation

Purpose

This guide describes how to secure the IBM DATABASE 2 (DB2) product using CA ACF2 Option for DB2.

This guide compares native DB2 security with CA ACF2 Option for DB2. It describes the features that replace DB2 internal security. It explains how CA ACF2 Option for DB2 helps you administer and maintain DB2 security. This guide is not intended to replace information that IBM provides with DB2. Its intent is only to summarize this information to the extent that it relates to CA ACF2 Option for DB2.

This guide also explains how to interpret CA ACF2™ Security for z/OS (CA ACF2) reports with CA ACF2 Option for DB2 information. To run CA ACF2 reports with CA ACF2 Option for DB2 information, you must use the CA ACF2 Security Reports and Utilities Guide. The CA ACF2 Reporting with CA Earl guide provides information about running CA Earl reports.

In this guide, you will learn how to:

Security administrators, database administrators (DBAs), and applications programmers should read this guide. Because CA ACF2 security administrators typically coordinate information security at a site and implement CA ACF2, this guide is critical reading for them. DBAs should read this guide to learn how CA ACF2 Option for DB2 relates to DB2 security concepts and what it means to them. Applications programmers should read “Comparing DB2 and CA ACF2 Option for DB2 Features,” to determine what resources they must access when they write DB2 programs.

After reading this guide, security administrators with even a limited knowledge of DB2 should be able to administer CA ACF2 Option for DB2 security, although additional DB2 education is beneficial. Programming experience is not necessary, but some data processing knowledge is helpful. An CA ACF2 Option for DB2 security administrator should have a conceptual understanding of the vocabulary and procedures necessary to administer CA ACF2. Inexperienced security administrators and DBAs can gain this understanding by reading the CA ACF2 General Information Guide. Experience administering CA ACF2 in a z/OS environment using ACF commands or ISPF panels is also helpful. CA ACF2 training classes are invaluable in providing the necessary education and background.

Related Publications

CA Technologies supplies the following publications related to CA ACF2 Option for DB2 and CA Common Services for z/OS (formerly known as Unicenter TNG Framework for OS/390 Common Services):

Name

Contents

CA ACF2 documentation set

Contains guides that let you implement, administer, and customize CA ACF2 for z/OS.

CA Common Services for z/OS Administrator Guide

Provides operating instructions for CA Common Services for z/OS.

CA Common Services for z/OS Getting Started

Describes the installation procedure and installation JCL for CA Common Services for z/OS .

CA Message Guide

Provides messages and codes for CA Common Services for z/OS.

CA Earl Reference Guide

Provides detailed information about CA Earl statements, parameters, and coding rules. Also explains the CA Earl Reporting Service.

CA Earl User Guide

Presents an introduction to CA Earl features and capabilities. Designed for users interested in learning about CA Earl.

CA Earl Systems Programmer Guide

Lists the installation options for CA Earl and instructions for modifying them. Also describes size requirements and program execution.

CA Earl Examples Guide

Contains sample programs that show a variety of common applications.

CA might refer to or recommend the following IBM publications:

Name

Catalog Number

IBM DATABASE 2 General Information

GC26‑4373

IBM DATABASE 2 System and Database Administration Guide

SC26‑4374

IBM DATABASE 2 Command and Utility Reference

SC26‑4378

IBM DATABASE 2 SQL Reference

SC26‑4380

IBM DATABASE 2 Messages and Codes

SC26‑4379

Command Notation

This guide uses the following command notation.

Enter the following exactly as they appear in command descriptions:

Command Notation

Description

UPPERCASE

Identifies commands, keywords, and keyword values that must be coded exactly as shown.

MIXed Cases

Identify command abbreviations. The uppercase letters are the minimum abbreviation; lowercase letters are optional.

symbols

All symbols such as commas, equal signs, and slashes must be coded exactly as shown.

The following clarify command syntax; do not type these as they appear:

Command Notation

Description

italics

Indicates that you must supply a substitution (a user‑supplied value).

[ ]

Identifies optional keywords or parameters.

{ }

Requires choosing one of the keywords or parameters listed.

underlining

Shows default values that need not be specified.

|

Separates alternative keywords or parameters; choose one.

Ellipses (...)

Mean the preceding items or group of items can be repeated more than once.

-

Continues a rule entry in an CA ACF2 Option for DB2 rule set.

The following is an example of a sample command:

DEComp {*|ruleid|Like(ruleidmask)} [Into(dsname)]

where:

DEC

Command abbreviation

*

Required alternative keyword

ruleid

Required alternative keyword

Like(ruleidmask)

Required alternative keyword

Into(dsname)

Optional parameter