For every e-business solution, the company should give more sound for database security. The database security plan should define: who is allowed to the instance and/or database where and how a user’s password will be verified authority level that a user is granted commands that a user is allowed to execute data that a user …
Tag: Privileges
Permanent link to this article: https://blog.openshell.in/2010/11/ibm-db2-security-mechanisms/