If you are implementing CA Top Secret Option for DB2 in an existing DB2 subsystem, you must perform a conversion as part of the implementation process. This conversion must take the existing native DB2 security information and convert the security controls into corresponding security controls in CA Top Secret for z/OS. We recommend that you plan accordingly for this part of the conversion.
Business Value:
DB2 has an internal security process based on SQL GRANT and REVOKE statements. The native DB2 security authorizations are maintained in DB2 system tables, from which DB2 performs security checks whenever a DB2 resource is accessed. This conversion involves an implementation team, including the database administrators currently responsible for DB2 security and the security administrators responsible for the CA Top Secret for z/OS security controls.
More Information:
For the tasks involved in the implementation process and the personnel required for the implementation team, see the Product Guide.
|
Copyright © 2010 CA Technologies.
All rights reserved.
|
|