Previous Topic: Securing Database Name TablesNext Topic: Securing Run Units


Securing Access to Non-SQL-Defined Databases

How to Do It

To secure access to a non-SQL-defined database, these resource types must be secured:

Depending on your database definitions and runtime environment, you may also need to secure these resource types:

* Resource type automatically secured if security for DB is activated.

Note: For more information about securing DB, DBADMIN, AREA, DBTB, and DMCL, see Securing Common Database Resources.

Other Security Techniques

CA IDMS also supports security techniques such as compiler security and database procedures that were supported prior to Release 12.0.