Site Map   |   Contact Us


Home
SHARE in Boston

DB2 Security: Protect Your Assets

Tuesday, August 3, 2010: 11:00 AM-12:15 PM
Room 103 (Hynes Convention Center)
Speaker: Roger Miller (IBM Corporation)
Handouts
  • Share_DB2_security_2010July26a.pdf (2.8 MB)
  • This is a presentation of DB2 for z/OS Security, starting with the objects, describing their relationships and discussing techniques for security and auditing. The first part of the session will discuss native DB2 security. This presentation starts at the DB2 V6 level and includes information about changes in DB2 Version 7 and beyond.

    The second part of the session will focus on the DB2 option to use RACF or the z/OS Security Server for access control. This session will begin with discussing whether to choose this option. DB2 has always relied upon operating system identification and authentication, but has separate SQL mechanisms for access control that provides integration with the database management system. It is very important to understand the relationships and the integration if you make choices about DB2 security.

    Tracks: Database Administration and Security Administration
    Share |




    See more of Project: Database
    See more of Program: Information Management