Previous Topic: DB2 ConsiderationsNext Topic: DB2 Subsystems


Implementation Strategy

Implement DB2 security in stages:

As soon as the CA Top Secret base product is installed, you can start defining DB2 resources and permitting access to them. CA Top Secret for DB2 does not have to be installed until you are ready to activate your definitions.