Now that you've completed this tutorial, you should have a fundamental understanding of the following topics:
Elements of a DB2 security plan: You should understand the structure of the entire DB2 environment, which includes client, servers, gateways, and hosts. You should also understand authentication, authorization, and privileges.
DB2 authentication types: You should know how to set
authentication types using the
db2 update dbm cfg using authentication type
command on the server, and using the
db2 catalog database command on the gateway
DB2 authorities: You should understand the basics of the
SYSADM, SYSCTRL, SYSMAINT, and SYSMON authorities, which are set in
the DBM CFG file. You should also understand the basics of the DBADM,
LOAD, and SECADM authorities, which are set using the
GRANT command and revoked using the
REVOKE command. Additionally, you should
know what command each authority is allowed to run.
DB2 privileges: You should have an understanding of the
different types of privileges and what they allow a user to do.
Examples are CONTROL, INSERT, DELETE, CREATEIN, DROPIN, REFERENCES,
and SELECT. You should also know how a privilege is obtained/revoked
commands), implicitly, or (for packages only) indirectly. In addition
to this you should have a basic understanding of label-based access
control, and how to define different types of policies based on this
new security concept.
To access other tutorials in this series, bookmark the series page, DB2 9 DBA exam 731 prep tutorials.