Access to privileges based on factors other than RACF profiles

The security administrator can grant access to privileges by using the RACF profiles.

Several other factors can grant access to privileges. These factors are checked before checking the applicable RACF profiles and they include the following items:

  • Implicit privileges of ownership
  • Matching schema names
  • Ownership of other objects