How to Do It
To secure access to a non-SQL-defined database, these resource types must be secured:
Depending on your database definitions and runtime environment, you may also need to secure these resource types:
* Resource type automatically secured if security for DB is activated.
Note: For more information about securing DB, DBADMIN, AREA, DBTB, and DMCL, see Securing Common Database Resources.
Other Security Techniques
CA IDMS also supports security techniques such as compiler security and database procedures that were supported prior to Release 12.0.
|
Copyright © 2014 CA.
All rights reserved.
|
|