Articles & Content


E16 - Trusted Context and Roles - How Are You Serving Up Your Security?

Topic: Cross Platform DB2 for z/OS & LUW

Subtopic: 2015

Practical approaches to how to utilize these DB2 constructs to manage access and ownership of your objects and data.
Using ROLE's to own and manage your objects and data can remove authids and groups from the security picture.
Useful information allowing you to verify whether you’re environment is as secure as you think it is!

Click Here to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.