Reviewing security requirements
Review your existing security definitions to ensure they match your system software and functions you plan to use.
About this task
GRANT statements to support these authorizations are included in section 2 of the DDL member BPOYAUTH.
Procedure
To work with the Host Online Monitor, set the following DB2® privileges:
- EXECUTE
- On the host online monitor plan (K02PLAN).
- MONITOR1
- Grants the privilege to obtain IFC data classified as serviceability data, statistics, accounting, and other performance data that does not contain potentially sensitive data.
- MONITOR2
- Grants the privilege to obtain IFC data classified as containing potentially sensitive data, such as SQL statement text and audit data. Note that users with MONITOR2 privileges have also MONITOR1 privileges.
- TRACE and DISPLAY
- For users who have to use the CRD function.