Appendix E. Security Considerations in SQL Procedures


Controlling access to the information stored in a database is a key requirement for almost all database implementations. DB2 offers database administrators a number of options on how they can control the access, creation, and manipulation of data in their systems. These privileges range from being allowed to read from a table using a SELECT statement to restricting users from creating new tables.

Stored procedures can perform a wide range of operations, including working with data and executing DDL. When building the procedures, it is important to consider who will need to be able to execute the procedures and what level of privileges they will need. It is also important to understand what is happening behind the scenes when a procedure is created.

This appendix provides an overview on security on each of the platforms. The platform-specifc documentation on security should be referenced for a more detailed view on security.



    DB2 SQL PL. Deployment and Advanced Configuration Essential Guide for DB2 UDB on Linux., UNIX, Windows, i5. OS, z. OS
    Intelligent Enterprises of the 21st Century
    ISBN: N/A
    EAN: 2147483647
    Year: 2003
    Pages: 205

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net