home 
 
 
 
ennl
 
Home
A propos
Services
Cours
Ressources
Contacts
MyABIS
C
Tous les coursbalkjeGénéralités » Introduction HW & SW » Soft skills » Cycles completsSystèmes d’exploitation » MVS - z/OS » Linux - UNIX » Mac OS X » iPad et iPhone iOSBases de données et middleware » Relational databases & SQL » DB2 for z/OS » DB2 for LUW » Oracle » SQL Server » MySQL & MariaDB » IMS » CICS » IBM MQ » WebSphere » Data Science, Big data et analyticsDéveloppement d’applications » Méthodiques et techniques » TOGAF » PRINCE2 » Agile et Scrum » Les langages de programmation » Internet development » Object Oriented systems » Java » Development tools » SAS » XML » SOA & web servicesGestion de système » ITIL » SecuritybalkjeEn pratiqueInscriptions 
Cette page n'est pas disponible en français.
DB2 for z/OS: using RACF

DB2 for z/OS security has historically been performed using an external security product such as RACF to secure the system, while access to DB2 objects and data was controlled using DB2 internal security. However now more and more organisations are using RACF to control all aspects of DB2 security - both at the system and data levels.

This intensive, one-day course shows exactly how this may be achieved.

On successful completion of this course students will be able to:

Schedule

Il n'y a pas de sessions publiques à ce moment. Nous organisons volontièrement un cours en entreprise ou une session publique supplémentaire (en cas d'un nombre suffisant de participants). Intéressé ? Veuillez contacter ABIS.

Intended for

All DB2 or RACF security administrators wishing to gain further insight into controlling DB2 security using RACF.

Background

A working knowledge of RACF (see Understanding RACF) and an understanding of DB2 for z/OS at a conceptual & terminological level (see Using DB2 for z/OS).

Main topics

Security overview; Sign-on security; Connection security; DB2 internal security; Other options; Security strategy (Transaction Manager or DB2); Security strategy (centralised or decentralised); Using remote applications.

DB2 security; DB2 security mechanism; DB2 security tables; Security terms; Authorisation ID; Privilege; Resource; Primary and Secondary Authorisation IDs; Maintaining security; Data Control Language; Grouped privileges; Explicit & implicit privileges; Ownership considerations; Static and Dynamic SQL; Static SQL considerations; Dynamic SQL considerations; DB2 security disadvantages.

SQL GRANT and REVOKE statements; Cascading REVOKE; Package, plan & collection privileges; Database, table, & view privileges; Other object privileges; System privileges; DCL examples: application development, Bind, program execution; Insufficient authority.

DB2 catalog security tables; Common table columns; Security tables 1 - 4; Auditing tables; Audit trace.

What is RACF?; Identifying and verifying users; Checking authorisations; Recording and reporting; Terminology - users and groups; Terminology - resources and classes; Terminology - profiles; User profile; Resource Profile; Discrete and generic profiles; Creating Generic Profiles; Maintaining RACF Security.

Address space authorisation; Protected access profiles; RACF router table; DB2 address spaces; Permitting RACF access; Protecting DB2 data sets - create profiles; Protecting DB2 data sets - permitting access.

Native DB2 security; DB2 with RACF; RACF / DB2 external security module; Installation; Mapping DB2 authorisation checks; Scope of RACF classes; Multi-subsystem scope classes; Single subsystem scope classes; Customisation; DB2 objects and RACF classes; Profiles; Privileges - buffer pools, storage groups & tablespaces; Privileges - DB2 system; Privileges - database and schema; Privileges - tables, views, indexes and user-defined functions; Privileges - collection, plan and package; Privileges - distinct types, sequences and stored procedures; Privileges - administrative authorities; Insufficient authority; Migration tools.

Multi-level security overview; Security labels; Row level granularity; Multi-level security and SELECT; Multi-level security and INSERT; Multi-level security and UPDATE; Multi-level security and DELETE; Multi-level security and utilities; Row and column access control; row permissions; column masks.

Distributed Data overview; DDF components; Communications tables; Security actions (client); Security actions (server with SNA client); Security actions (server with TCP/IP client).

Training method

Lecturing and exercises. Also available as virtual classroom.

Duration

1 day.

Course leader

RSM Technology, Peter Vanroose.

Reviews

     
excellent (, )
     
ok - nice refresh (, )
     
good overview (, )

INFO SESSION ET INSCRIPTION