Previous Topic: DB2 SubsystemsNext Topic: Implementing Security for Other CA Products


CA Top Secret for DB2

The control of DB2 resources is accomplished using standard CA Top Secret methods. All new DB2 resources have full scope checking and administrative authority support which eliminates the need for secondary authorization IDs and the cascading revoke problems. The direct benefits of CA Top Secret for DB2 are: