This chapter introduces the subject of native DB2 security and authorizations. It lists the objects and resources that can be protected in a DB2 environment, as well as the mechanisms used to protect them. It also discusses authorization IDs, authorities and privileges.
This section contains the following topics:
What Can I Secure in a DB2 Environment?
What Are DB2 Authorities and Privileges?
|
Copyright © 2011 CA Technologies.
All rights reserved.
|
|