Since DB2 was introduced, many users have found the internal DB2 security functions cumbersome to use. So, CA Technologies created CA ACF2 Option for DB2 to provide the security features that DB2 users demanded.
Like its z/OS counterpart, CA ACF2 Option for DB2 provides protection against unauthorized destruction, disclosure, or modification of data. It protects DB2 resources by default and provides for the controlled sharing of resources. It also replaces the GRANT and REVOKE statements of native DB2 security with CA ACF2 Option for DB2 rules that permit or deny access to DB2 resources. Access to a resource is granted through a rule written by a security administrator. Use of the powerful user identification string (UID) enables you to grant resource access to groups of users in ways that your organization has defined. Additional controls let you limit access to particular time periods and specific functions.
CA ACF2 Option for DB2 uses the CAIENF component of CA Common Services for z/OS to capture the DB2 authorization checks and to isolate CA ACF2 Option for DB2 from changes that might occur in future releases of DB2.
This section contains the following topics:
What Terms Do You Need to Know?
Why Do You Need CA ACF2 Option for DB2?
|
Copyright © 2011 CA Technologies.
All rights reserved.
|
|