Articles & Content
Topic: 2009 NA
Subtopic: DB2 for LUW
DATE: 2009-5-12 (01:30 PM - 02:30 PM)
SPEAKERS: Jim Pickel (IBM)
The information highway continues to increase the demand for instant access to information without boundaries. How can you protect your data with all these new demands? The mainframe is the most secure environment but only if you utilize its features. This session discusses various new practices for DB2 for z/OS security including trusted context and roles introduced in Version 9. Most sites have a range of security needs and objectives. For some situations, a basic application security model is adequate to protect your information. For others, a comprehensive data-centric security model is needed to protect your information from all types of access. Choices and guidelines will be primary points, discussing ways to utilize the new techniques to improve compliance and security for your site. The objective is to help you understand the range of choices, the recent DB2 changes and how to make incremental enhancements to protect your data. Donít let your business be in the headlines.
EXP. LEVEL: Beginner,Intermediate
Most applications contain business security logic. Learn about the risks to your information using this approach.
In the past, protecting your information from end users was sufficient, but today protecting your information from internal users is now a requirement. Learn about ways to control the use DB2 administrative authorities to protect your information.
DB2 new security controls are very flexible and can be customized to meet your individual needs. Learn how to set up trusted contexts and roles in DB2 and all the options available.
Previously, DB2 requires users own objects. Learn how to transfer ownership from a user to a role and set up context sensitive privileges using a role.
Today, most application servers perform end user authentication outside of z/OS and use a common user ID to access DB2. Learn how to set up an application server to automatically propagate the end user identity and associate it with each SQL request.
Click Here to Download
NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.