Topic: DB2 for z/OS
Practical approaches to how to utilize these DB2 constructs to manage access and ownership of your objects and data.
Using ROLE's to own and manage your objects and data can remove authids and groups from the security picture.
Useful information allowing you to verify whether you’re environment is as secure as you think it is!
Click Here to Download
NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.