Articles & Content

Archives

B13 - Trusted Context and Roles - How are you serving up your security?

Topic: DB2 for z/OS

Subtopic: 2015



Practical approaches to how to utilize these DB2 constructs to manage access and ownership of your objects and data.
Using ROLE's to own and manage your objects and data can remove authids and groups from the security picture.
Useful information allowing you to verify whether you’re environment is as secure as you think it is!



Click Here to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.