Data architect, Securing DB2 data
Grant privileges to a what, not a who
From the developerWorks archives
Date archived: March 7, 2017 | First published: May 03, 2011
Role-based security gives you a way to protect your organization's information assets and has been available since the release of DB2 V9.5 for Linux®, UNIX®, and Windows®(LUW), and DB2 9 for z/OS®. However, many users are still confused about when to use this feature. In his column, Robert Catterall clarifies the purpose and advantages of roles and trusted contexts.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.