Advertisement

Beginning DB2 pp 163-175 | Cite as

Controlling Access to DB2

Abstract

It’s time to discuss the topic of access control—or more formally how users are authenticated when trying to access DB2—and the mechanisms used to control who can connect to databases, who can attach to instances, and the baked-in powers available to special groups and users.

Keywords

Controlling Access Privilege Group Window Operating System Authentication Setting Authentication Type 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Grant Allen 2008

Personalised recommendations