How DB2 Resource Checking works.
search cancel

How DB2 Resource Checking works.

book

Article ID: 12786

calendar_today

Updated On:

Products

Top Secret Top Secret - LDAP

Issue/Introduction



How does DB2 resource checking works to determine if a user is authorized for a DB2 resource?

Environment

Release: TOPSDB00200-1.3-Top Secret-Security-Option for DB2 UDB
Component:

Resolution

In an attempt to check for access to DB2 resources there are a number of checks issued which check for authorization from the lowest level to the highest. In the case of checking for LOAD access to a DB2TABLE the possible resource permissions which will allow access include:

1 ALL access to a DB2TABLE
2 LOAD access to a DB2TABLE
3 LOAD access to a DB2DBASE
4 DBCTRL access to a DB2DBASE
5 Access to DB2SYS(DATAACCESS)
6 Access to DB2SYS(SYSCTRL)
7 Access to DB2SYS(SYSADM)

The above checks will be issued in order. If the results of any of those checks allows access then the load will be allowed.