Reviewing security requirements

Review your existing security definitions to ensure they match your system software and functions you plan to use.

About this task

GRANT statements to support these authorizations are included in section 2 of the DDL member BPOYAUTH.

Procedure

To work with the Host Online Monitor, set the following DB2® privileges:
EXECUTE
On the host online monitor plan (K02PLAN).
MONITOR1
Grants the privilege to obtain IFC data classified as serviceability data, statistics, accounting, and other performance data that does not contain potentially sensitive data.
MONITOR2
Grants the privilege to obtain IFC data classified as containing potentially sensitive data, such as SQL statement text and audit data. Note that users with MONITOR2 privileges have also MONITOR1 privileges.
TRACE and DISPLAY
For users who have to use the CRD function.