Protection of the interface of the administrative task scheduler
The administrative task scheduler interface is protected against unauthorized access by other users. Credentials of a task are checked but not stored.
Users with EXECUTE rights on one of the stored procedures or user-defined table functions of the administrative task scheduler interface are allowed to execute the corresponding functionality: adding a scheduled task, removing a scheduled task, or listing the scheduled tasks or their execution status. The entire interface is configured by default with PUBLIC access rights during the installation.
- Grant rights to groups or roles, rather than to individual authorization IDs.
- Restrict access to the ADMIN_TASK_ADD and ADMIN_TASK_REMOVE stored procedures to users with a business need for their use. Access to the user-defined table functions that list tasks and execution status can remain unrestricted.
The authorization ID of the Db2 thread that called the stored procedure ADMIN_TASK_ADD is passed to the administrative task scheduler and stored in the task list with the task definition. The ADMIN_TASK_ADD stored procedure gathers the authorities granted to this authorization ID from the subsystem parameters and from the catalog table, and passes them over to the administrative task scheduler. The same mechanism is used in ADMIN_TASK_REMOVE to verify that the user is permitted to remove the task.
A task in the task list of the administrative task scheduler can be removed by the owner of the task, or by any user that has SYSOPR, SYSCTRL, or SYSADM privileges. The owner of a task is the CURRENT SQLID of the process at the time the task was added to the task list.