Data architect, Securing DB2 data

Grant privileges to a what, not a who

From the developerWorks archives

Robert Catterall

Date archived: March 7, 2017 | First published: May 03, 2011

Role-based security gives you a way to protect your organization's information assets and has been available since the release of DB2 V9.5 for Linux®, UNIX®, and Windows®(LUW), and DB2 9 for z/OS®. However, many users are still confused about when to use this feature. In his column, Robert Catterall clarifies the purpose and advantages of roles and trusted contexts.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Information Management, Security
ArticleID=648335
ArticleTitle=Data architect: Securing DB2 data
publish-date=05032011