10.1. DB2 Security Model: The Big Picture
The DB2 security model consists of three major components: authentication, administrative authorization, and database object security (also known as database object privileges). Figure 10.1 illustrates these components.
Figure 10.1. The big picture of the DB2 security model
A combination of external security services and internal DB2 authorization mechanisms handle DB2 security. As shown in Figure 10.1, a user goes through the authentication process before connecting to the database. Once the user ID and password have been successfully verified, an internal DB2 process takes over ...
Get Understanding DB2®: Learning Visually with Examples now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.