Db2 12 for Z/OS: Managing Security Chapter 1
Total Page:16
File Type:pdf, Size:1020Kb
Db2 12 for z/OS Managing Security IBM SC27-8854-02 Notes Before using this information and the product it supports, be sure to read the general information under "Notices" at the end of this information. Subsequent editions of this PDF will not be delivered in IBM Publications Center. Always download the latest edition from PDF format manuals for Db2 12 for z/OS (Db2 for z/OS in IBM Documentation). 2021-09-10 edition This edition applies to Db2® 12 for z/OS® (product number 5650-DB2), Db2 12 for z/OS Value Unit Edition (product number 5770-AF3), and to any subsequent releases until otherwise indicated in new editions. Make sure you are using the correct edition for the level of the product. Specific changes are indicated by a vertical bar to the left of a change. A vertical bar to the left of a figure caption indicates that the figure has changed. Editorial changes that have no technical significance are not noted. © Copyright International Business Machines Corporation 1982, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this information.......................................................................................... ix Who should read this information................................................................................................................x Db2 Utilities Suite for z/OS...........................................................................................................................x Terminology and citations............................................................................................................................x Accessibility features for Db2 12 for z/OS..................................................................................................xi How to send your comments about Db2 for z/OS documentation............................................................ xi How to read syntax diagrams.....................................................................................................................xii Chapter 1. Getting started with Db2 security.......................................................... 1 Db2 security solutions................................................................................................................................. 1 Db2 data access control.............................................................................................................................. 1 ID-based access control within Db2......................................................................................................2 Role-based access control within Db2.................................................................................................. 3 Ownership-based access control within Db2........................................................................................3 Access control through multilevel security............................................................................................4 Access control external to Db2.............................................................................................................. 4 Db2 subsystem access control....................................................................................................................4 Managing access requests from local applications...............................................................................5 Managing access requests from remote applications...........................................................................5 Data set protection.......................................................................................................................................6 Scenario: Securing data access with Db2 facilities at Spiffy Computer.....................................................6 Determining security objectives.............................................................................................................7 Securing manager access to employee data......................................................................................... 7 Securing access to payroll operations and management................................................................... 11 Managing access privileges of other authorities................................................................................. 15 Chapter 2. Managing access through authorization IDs and roles.......................... 19 Authorization IDs and roles.......................................................................................................................21 Authorization IDs..................................................................................................................................21 Roles in a trusted context.................................................................................................................... 22 Privileges and authorities.......................................................................................................................... 23 Explicit privileges................................................................................................................................. 23 Implicit privileges through object ownership......................................................................................29 Administrative authorities....................................................................................................................31 Common Db2 administrative authorities.............................................................................................42 Utility authorities for Db2 catalog and directory................................................................................. 43 Privileges by authorization ID and authority....................................................................................... 44 Managing administrative authorities.........................................................................................................53 Separating the SYSADM authority........................................................................................................53 Migrating the SYSADM authority..........................................................................................................56 Creating roles or trusted contexts with the SECADM authority.......................................................... 59 Altering tables with the system DBADM authority.............................................................................. 60 Accessing data with the DATAACCESS authority.................................................................................60 Granting and revoking privileges with the ACCESSCTRL authority.....................................................61 Managing explicit privileges...................................................................................................................... 62 Granting privileges to a role................................................................................................................. 62 Granting privileges to the PUBLIC ID...................................................................................................63 Granting privileges to remote users.....................................................................................................64 Granting privileges through views....................................................................................................... 64 Granting privileges through administrative authorities.......................................................................65 iii Granting privileges with the GRANT statement...................................................................................65 Revoking privileges with the REVOKE statement................................................................................70 Managing implicit privileges...................................................................................................................... 79 Managing implicit privileges through object ownership......................................................................80 Managing implicit privileges through plan or package ownership......................................................82 Managing implicit privileges through routines.................................................................................... 90 Retrieving privilege records in the Db2 catalog......................................................................................103 Catalog tables with privilege records................................................................................................ 103 Retrieving all authorization IDs or roles with granted privileges......................................................104 Retrieving multiple grants of the same privilege...............................................................................105 Retrieving all authorization IDs or roles with the DBADM and system DBADM authorities............ 105 Retrieving all IDs or roles with access to the same table................................................................. 106 Retrieving all IDs or roles with access to the same routine..............................................................107 Retrieving plans or packages with access to the same table........................................................... 107 Retrieving privilege information through views.................................................................................108