Articles & Content


Best Practices in DB2 Security (C11)

Topic: 2008 NA

Subtopic: DB2 for z/OS

DATE: 2008-05-21 (02:45 PM - 03:45 PM)
SPEAKERS: Jim Pickel (IBM)

Everyone is aware of security today. Improving integration of data and making security more robust and easier to manage are very important. In today’s world of e-business, and data on demand from everywhere, there is an increased focus on security and privacy of information from both within and outside your organization. Most of us can identify information that needs to be protected. We are all cognizant of the need to protect the privacy of our own identity and personal information. Improving integration and making security more robust and easier to manage is very important. There is no simple remedy to compliance efforts and to solve compliance issues. In this presentation, we will discuss new approaches introduced in DB2 Version 9.1 for z/OS that can help solve some of your issues by giving you better ways to control access to your DB2 data from both privileged users and remote applications accessing your DB2 subsystems.

EXP. LEVEL: Intermediate


Show how you can provide better access control from application servers by configuring a trusted context.

Show how you can control the use of a privileged authorities by enabling and disabling a trusted context set up for each DBA.

Discuss an approach to eliminate the need for a user to own DB2 objects by using roles as object owners.

Discuss ways for a DBA to securely manage objects owned by other users.

Discuss an approach to provide better auditing of users accessing your DB2 subsystem from remote applications.

This file is being provided by IDUG. We would encourage you to join IDUG to get full access to all of our files and resources. Joining IDUG is FREE and signing up is simple. Click here to join! or login!

Download File
Click to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.