IBM PureData System for Analytics (Netezza) and Db2 security compatibility
In Netezza®, authentication can occur either within the database or with an external entity such as an external LDAP server, if you configured the product to support that. Authorization occurs within the database. In Db2®, authentication occurs outside the database, and authorization generally occurs inside the database.
- Administrator
- People with the Administrator role have access to all of the features in the web console. They can manage database access by creating and deleting users, assigning users to roles, and performing other security-related functions, such as changing user passwords. A Db2 environment comes with a built-in ID called bluadmin that has the Administrator role.
- User
- People with the User role have access to many of the features in the web console and can manage their own user profiles. They also have full access to their own tables and can give other users permission to access and use those tables.
If the built-in user roles do not provide enough flexibility, people with the Administrator role can create user-defined roles with different authorities and privileges and assign those roles to users.
To add or delete users and assign them to or remove them from built-in roles, people with the Administrator role use the web console. People with the Administrator role can also use the console to grant privileges and authorities to roles and revoke that access by creating GRANT and REVOKE SQL statements either directly or, in some cases, by using GUI controls. To create or delete user-defined roles and manage membership in those roles, people with the Administrator role can issue SQL statements by using the web console, CLPPlus, or the Data Studio client.
In a Netezza system, you can use Multi-Level Security (MLS) to define rules to control access to row-secure tables. In a Db2 system, you can use row and column access control (RCAC) to control access to a table at the row level, column level, or both. RCAC is based on two sets of rules: one set operates on rows (row permissions), and the other set operates on columns (column masks). To create, alter, and drop RCAC rules, you use SQL statements.
For details about differences between Netezza and Db2 SQL that are related to security, see IBM PureData System for Analytics (Netezza) and Db2 SQL compatibility.