Previous Topic: Message Queue Manager ProtectionNext Topic: IBM DCE, SystemView, Netview, and OPTIME Protection


DB2 Resource Protection

All the DB2 resources have full scope checking and administrative authority support. This eliminates the need for secondary authorization IDs and the cascading revoke problems. The benefits of CA Top Secret for DB2 are:

The DB2 resources include:

DB2BUFF     DB2PLAN      DB2SYS
DB2COLL     DB2TABLE     DB2TABSP
DB2PKG      DB2BASE      DB2STOGP

DB2 Resource Ownership

To establish ownership, use TSS CREATE/ADDTO.

Example: establish DB2 resource ownership

This example adds and permits a DB2 resource:

TSS ADDTO(ENGDEPT) DB2PLAN(SR19052P)
TSS PERMIT(USRMIKE) DB2PLAN(SR19052P)  
                    ACCESS(BIND)

DB2 Resource Ownership Removal

To remove ownership of a DB2 resource

  1. Revoke all permissions for the resource. You cannot specify an access level.
  2. Remove the ownership of the DB2 resource.

Example: remove DB2 resource ownership

This example removes ownership of a DB2 resource:

TSS REVOKE(USRMIKE) DB2PLAN(SR19052P)
TSS REMOVE(ENGDEPT) DB2PLAN(SR19052P)