Previous Topic: Evaluate Who Should Get Access to WhatNext Topic: Identify Users


Determine Appropriate Security Mode

The mode used for specific DB2 resource checks defaults to the mode of the facility used for the DB2 subsystem, unless the mode is specified on a PERMIT. The facility is determined by the specification of the DB2FAC control option. Consider the following scenario:

All security checks from TSO or CICSPROD accessing DB2 subsystem DSNP will occur in FAIL mode under the DB2PROD facility. Unless MODE is specified on the resource permission, the mode is determined by the DB2 facility.

CA Top Secret Option for DB2 supports all four security modes (DORMANT, WARN, IMPLEMENT, FAIL) for DB2 resource protection.