29 May,2011 by Tom Collins
DBA Interview Questions and Answers for a DB2 on Linux , Unix and Windows DBA focusing on DB2 Security Management
Read the DB2 Security Notes for checklists on DB2 Authentication Types,Authorities,DB2 Privileges,Object Privileges,GRANT & REVOKE usages
Authorities express a set of rights to perform high level Administrative functions
DB2 Database Manager Configuration file.
To view the parameter values is the command :
Get dbm cfg
To update the sysmaint_group value. Use the command:
Update dbm cfg using symaint_group <my_group>
The authorities and privileges granted automatically when a database is created are:
a)DBADM,CONNECT,CREATETAB,BINDADD,CREATE_NOT_FENCED,IMPLICIT_SCHEMA,LOAD to the database creator
b)PUBLIC is granted USE privilege on USESPACE1
c)PUBLIC is granted CONNECT,CREATETAB,BINDADD,IMPLICIT_SCHEMA
The CONTROL view privilege .Also allows all privileges (except CONTROL) to be granted
The “authentication” parameter
EXECUTE privilege on the stored procedure ; SELECT privilege on the table
Possible objects include : NICKNAME,VIEWS,TABLES
The SYSCTRL authority can GRANT and REVOKE the USE table space privilege.
The full list of Database Privileges is:
CONNECT
QUIESCE_CONNECT
IMPLICIT_SCHEMA
CREATETAB
BINDADD
CREATE_EXTERNAL_ROUTINE
CREATE_NOT_FENCED_ROUTINE
Kerberos authentication occurs at the server workstation.
Read the DB2 Security Notes for checklists on DB2 Authentication Types,Authorities,DB2 Privileges,Object Privileges,GRANT & REVOKE usages
Source:Jack Vamvas(http://www.dba-db2.com)This is only a preview. Your comment has not yet been posted.
As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.
Having trouble reading this image? View an alternate.
Posted by: |