Articles & Content
Topic: 2010 EMEA
Subtopic: DB2 for z/OS
DATE: 2010-11-9 (15:45 - 16:45)
SPEAKERS: Leila Sadat Hosseini (Telecommunication of tehran)
Security is one of the serious part of each important database like DB2 .One part of this security would be the answer of these questions:1- Which IP ADDRESS can be used by users defined in RACF? 2 - Should Users that bind to IP ADDRESS have restricted grant to DB2?If there is multiple DB2 subsystems running, RACF controls which users can use a specific DB2 subsystemIn this presentation Security zone and determination the level of access to each DB2 would be defined.
EXP. LEVEL: Beginner,Intermediate,Advanced
Bind RACF username To IPADDRESS
protect DDFRemote applications could not Connect To DB2 ,without Systems programmer confirm
you CAN specify the Level of access for users,Who CAN run batch jobs or use of WLM managed Stored PROCEDURE
CICS or IMS users are managed too.
if you Have multiple DB2 subsystems running, RACF controls which users CAN use a specific DB2 subsystem
This file is being provided by IDUG. We would encourage you to join IDUG to get full access to all of our files and resources. Joining IDUG is FREE and signing up is simple. Click here to join! or login!Click to Download
NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.