Articles & Content

Archives

Protect DB2 subsystems (B07)

Topic: 2010 EMEA

Subtopic: DB2 for z/OS



DATE: 2010-11-9 (15:45 - 16:45)
SPEAKERS: Leila Sadat Hosseini (Telecommunication of tehran)

Security is one of the serious part of each important database like DB2 .One part of this security would be the answer of these questions:1- Which IP ADDRESS can be used by users defined in RACF? 2 - Should Users that bind to IP ADDRESS have restricted grant to DB2?If there is multiple DB2 subsystems running, RACF controls which users can use a specific DB2 subsystemIn this presentation Security zone and determination the level of access to each DB2 would be defined.

EXP. LEVEL: Beginner,Intermediate,Advanced

OBJECTIVES:

Bind RACF username To IPADDRESS

protect DDFRemote applications could not Connect To DB2 ,without Systems programmer confirm

you CAN specify the Level of access for users,Who CAN run batch jobs or use of WLM managed Stored PROCEDURE

CICS or IMS users are managed too.

if you Have multiple DB2 subsystems running, RACF controls which users CAN use a specific DB2 subsystem



This file is being provided by IDUG. We would encourage you to join IDUG to get full access to all of our files and resources. Joining IDUG is FREE and signing up is simple. Click here to join! or login!

Download File
Click to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.