With native DB2 security, your site may not have a choice as to how you administer security. Because of the way DB2 is designed, your database administrators (DBAs) may be responsible for many of the functions normally performed by security administrators. With CA Top Secret Option for DB2, your site can decide whether the security functions and responsibilities for DB2 are centralized or decentralized. Whether CA Top Secret Option for DB2 administration is centralized or decentralized (and to what degree) depends on the size, structure, and unique needs of your site. You may want some DBAs to perform a subset of administrative functions or you may want your security department to handle all security concerns. Central security administrators can administer any CA Top Secret Option for DB2 access permissions while security administrators in a decentralized environment have a more limited jurisdiction over DB2 resources. Security administrators in a centralized environment have a broader scope of authority, while security administrators in a decentralized environment are given control over smaller groups of ACIDs (for example, an individual department). Decentralized administrators may also have different levels of administrative authority (granted via the TSS ADMIN command).
For more information about centralized vs. decentralized security, see the CA Top Secret User Guide and Implementation guides.
The main function of the implementation team is to properly implement CA Top Secret Option for DB2 and related security systems and procedures. Their function is limited because most of the work occurs during the planning and implementation phases. If you created an implementation team (IT) to implement CA Top Secret, you may want to use this team to implement CA Top Secret Option for DB2. In addition to the current members, you will want to ask DB2 database administrators to join this team if they were not already included. Their participation and acceptance of CA Top Secret Option for DB2 is essential to successfully implementing CA Top Secret Option for DB2, because they play a critical role in creating and maintaining DB2 resources.
As the implementation plan takes shape, you should schedule all activities and events, and distribute schedules throughout the site to all key organizations. You should coordinate implementation timetables with related implementations of other system or product installations so they do not conflict.
Follow these steps to prepare to implement CA Top Secret Option for DB2:
|
Copyright © 2011 CA Technologies.
All rights reserved.
|
|