473,324 Members | 2,541 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,324 software developers and data experts.

DB2 Security

Uma
Hi Here is my question ..

Under Oracle right now we are having the security as ..

And I want the equivalent concept in DB2 . any help -->

here it is ...

connect system/manager

/********************************************/
/* Create the two roles used by WMS system */
/********************************************/
CREATE ROLE WMS_DBA;
CREATE ROLE WMS_USER;
CREATE ROLE WEB_USER;

/*************************************/
/* Grant privileges to the two roles */
/*************************************/
GRANT
ALTER ANY INDEX, ALTER ANY PROCEDURE, ALTER ANY ROLE, ALTER ANY
SEQUENCE, ALTER ANY TABLE, ALTER ANY TRIGGER, ALTER USER, COMMENT ANY
TABLE,
CREATE ANY INDEX, CREATE ANY PROCEDURE, CREATE ANY SEQUENCE, CREATE
ANY SYNONYM, CREATE ANY TABLE, CREATE ANY TRIGGER, CREATE ANY VIEW,
CREATE DATABASE LINK,
CREATE PROCEDURE, CREATE PUBLIC DATABASE LINK, CREATE PUBLIC SYNONYM,
CREATE SEQUENCE, CREATE SESSION, CREATE SYNONYM, CREATE TABLE, CREATE
TRIGGER, CREATE USER,
CREATE VIEW, DELETE ANY TABLE, DROP ANY INDEX, DROP ANY PROCEDURE,
DROP ANY ROLE, DROP ANY SEQUENCE, DROP ANY SYNONYM, DROP ANY TABLE,
DROP ANY TRIGGER, DROP ANY VIEW,
DROP PUBLIC DATABASE LINK, DROP PUBLIC SYNONYM, DROP USER, EXECUTE
ANY PROCEDURE, GRANT ANY ROLE, INSERT ANY TABLE, SELECT ANY SEQUENCE,
SELECT ANY TABLE, UPDATE ANY TABLE
TO
WMS_DBA WITH ADMIN OPTION;

GRANT
CREATE SESSION, SELECT ANY TABLE, EXECUTE ANY PROCEDURE
TO
WMS_USER;

/****************************************/
/* Drop the users identified as DBA's */
/****************************************/
DROP USER ABC CASCADE;

/****************************************/
/* Create the users identified as DBA's */
/****************************************/
CREATE USER ABC IDENTIFIED BY ABC DEFAULT TABLESPACE PKEYS_CWS
TEMPORARY TABLESPACE TEMP;

/************************************************** **********/
/* Grant the WMS_DBA Role to the users identified as DBA's */
/************************************************** **********/
GRANT WMS_DBA TO ABC;

/*************************************************/
/* This grants unlimited tablespace to user MWMS */
/*************************************************/
GRANT UNLIMITED TABLESPACE TO ABC IDENTIFIED BY ABC;

connect sys/change_on_install;
ALTER USER sys IDENTIFIED BY manager;
GRANT SELECT ON V_$SESSION TO WMS_USER;
GRANT SELECT ON V_$SESSION TO ABC;
GRANT SELECT ON dba_users TO WMS_USER;
GRANT SELECT ON dba_users TO ABC;
Nov 12 '05 #1
3 5041
"Uma" <ta******@hotmail.com> wrote in message
news:fd**************************@posting.google.c om...
Hi Here is my question ..

Under Oracle right now we are having the security as ..

And I want the equivalent concept in DB2 . any help -->

here it is ...

connect system/manager

/********************************************/
/* Create the two roles used by WMS system */
/********************************************/
CREATE ROLE WMS_DBA;
CREATE ROLE WMS_USER;
CREATE ROLE WEB_USER;

/*************************************/
/* Grant privileges to the two roles */
/*************************************/
GRANT
ALTER ANY INDEX, ALTER ANY PROCEDURE, ALTER ANY ROLE, ALTER ANY
SEQUENCE, ALTER ANY TABLE, ALTER ANY TRIGGER, ALTER USER, COMMENT ANY
TABLE,
CREATE ANY INDEX, CREATE ANY PROCEDURE, CREATE ANY SEQUENCE, CREATE
ANY SYNONYM, CREATE ANY TABLE, CREATE ANY TRIGGER, CREATE ANY VIEW,
CREATE DATABASE LINK,
CREATE PROCEDURE, CREATE PUBLIC DATABASE LINK, CREATE PUBLIC SYNONYM,
CREATE SEQUENCE, CREATE SESSION, CREATE SYNONYM, CREATE TABLE, CREATE
TRIGGER, CREATE USER,
CREATE VIEW, DELETE ANY TABLE, DROP ANY INDEX, DROP ANY PROCEDURE,
DROP ANY ROLE, DROP ANY SEQUENCE, DROP ANY SYNONYM, DROP ANY TABLE,
DROP ANY TRIGGER, DROP ANY VIEW,
DROP PUBLIC DATABASE LINK, DROP PUBLIC SYNONYM, DROP USER, EXECUTE
ANY PROCEDURE, GRANT ANY ROLE, INSERT ANY TABLE, SELECT ANY SEQUENCE,
SELECT ANY TABLE, UPDATE ANY TABLE
TO
WMS_DBA WITH ADMIN OPTION;

GRANT
CREATE SESSION, SELECT ANY TABLE, EXECUTE ANY PROCEDURE
TO
WMS_USER;

/****************************************/
/* Drop the users identified as DBA's */
/****************************************/
DROP USER ABC CASCADE;

/****************************************/
/* Create the users identified as DBA's */
/****************************************/
CREATE USER ABC IDENTIFIED BY ABC DEFAULT TABLESPACE PKEYS_CWS
TEMPORARY TABLESPACE TEMP;

/************************************************** **********/
/* Grant the WMS_DBA Role to the users identified as DBA's */
/************************************************** **********/
GRANT WMS_DBA TO ABC;

/*************************************************/
/* This grants unlimited tablespace to user MWMS */
/*************************************************/
GRANT UNLIMITED TABLESPACE TO ABC IDENTIFIED BY ABC;

connect sys/change_on_install;
ALTER USER sys IDENTIFIED BY manager;
GRANT SELECT ON V_$SESSION TO WMS_USER;
GRANT SELECT ON V_$SESSION TO ABC;
GRANT SELECT ON dba_users TO WMS_USER;
GRANT SELECT ON dba_users TO ABC;


Check out the SQL Reference manual.
Nov 12 '05 #2
Mark A wrote:
"Uma" <ta******@hotmail.com> wrote in message
news:fd**************************@posting.google.c om...
Hi Here is my question ..

Under Oracle right now we are having the security as ..

And I want the equivalent concept in DB2 . any help -->

here it is ...

connect system/manager

/********************************************/
/* Create the two roles used by WMS system */
/********************************************/
CREATE ROLE WMS_DBA;
CREATE ROLE WMS_USER;
CREATE ROLE WEB_USER;

/*************************************/
/* Grant privileges to the two roles */
/*************************************/
GRANT
ALTER ANY INDEX, ALTER ANY PROCEDURE, ALTER ANY ROLE, ALTER ANY
SEQUENCE, ALTER ANY TABLE, ALTER ANY TRIGGER, ALTER USER, COMMENT ANY
TABLE,
CREATE ANY INDEX, CREATE ANY PROCEDURE, CREATE ANY SEQUENCE, CREATE
ANY SYNONYM, CREATE ANY TABLE, CREATE ANY TRIGGER, CREATE ANY VIEW,
CREATE DATABASE LINK,
CREATE PROCEDURE, CREATE PUBLIC DATABASE LINK, CREATE PUBLIC SYNONYM,
CREATE SEQUENCE, CREATE SESSION, CREATE SYNONYM, CREATE TABLE, CREATE
TRIGGER, CREATE USER,
CREATE VIEW, DELETE ANY TABLE, DROP ANY INDEX, DROP ANY PROCEDURE,
DROP ANY ROLE, DROP ANY SEQUENCE, DROP ANY SYNONYM, DROP ANY TABLE,
DROP ANY TRIGGER, DROP ANY VIEW,
DROP PUBLIC DATABASE LINK, DROP PUBLIC SYNONYM, DROP USER, EXECUTE
ANY PROCEDURE, GRANT ANY ROLE, INSERT ANY TABLE, SELECT ANY SEQUENCE,
SELECT ANY TABLE, UPDATE ANY TABLE
TO
WMS_DBA WITH ADMIN OPTION;

GRANT
CREATE SESSION, SELECT ANY TABLE, EXECUTE ANY PROCEDURE
TO
WMS_USER;

/****************************************/
/* Drop the users identified as DBA's */
/****************************************/
DROP USER ABC CASCADE;

/****************************************/
/* Create the users identified as DBA's */
/****************************************/
CREATE USER ABC IDENTIFIED BY ABC DEFAULT TABLESPACE PKEYS_CWS
TEMPORARY TABLESPACE TEMP;

/************************************************** **********/
/* Grant the WMS_DBA Role to the users identified as DBA's */
/************************************************** **********/
GRANT WMS_DBA TO ABC;

/*************************************************/
/* This grants unlimited tablespace to user MWMS */
/*************************************************/
GRANT UNLIMITED TABLESPACE TO ABC IDENTIFIED BY ABC;

connect sys/change_on_install;
ALTER USER sys IDENTIFIED BY manager;
GRANT SELECT ON V_$SESSION TO WMS_USER;
GRANT SELECT ON V_$SESSION TO ABC;
GRANT SELECT ON dba_users TO WMS_USER;
GRANT SELECT ON dba_users TO ABC;

Check out the SQL Reference manual.


I think the answer roughly equates to ... the DB2 security model bears
no relationship to the Oracle security model and you need to look into
providing whatever security you are going to have through the operating
system or third-party (some IBM) product add-ins.

--
Daniel Morgan
http://www.outreach.washington.edu/e...ad/oad_crs.asp
http://www.outreach.washington.edu/e...oa/aoa_crs.asp
da******@x.washington.edu
(replace 'x' with a 'u' to reply)

Nov 12 '05 #3
> > Check out the SQL Reference manual.

I think the answer roughly equates to ... the DB2 security model bears
no relationship to the Oracle security model and you need to look into
providing whatever security you are going to have through the operating
system or third-party (some IBM) product add-ins.

--
Daniel Morgan


No, the answer relates to the fact that the manual has most of the answers
clearly explained and that the question is too broad in its present form
(sounds like someone just wants us to do the work for them). Once the person
has looked at the manual and has any questions about what is unclear, then
specific questions are welcome.
Nov 12 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: robert | last post by:
well, talk about timely. i'm tasked to implement a security feature, and would rather do so in the database than the application code. the application is generally Oracle, but sometimes DB2. ...
116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
4
by: Ashish | last post by:
Hi Guys I am getting the following error while implementing authentication using WS-security. "Microsoft.Web.Services2.Security.SecurityFault: The security token could not be authenticated...
0
by: prithvi g via .NET 247 | last post by:
Hi I am a newbie to .NET remoting, I am trying to implementauthorization using SSPI example provided by Michael Barnett. Ihave included the required dll(Microsoft.Samples.Security.SSPI.dll...
1
by: Earl Teigrob | last post by:
Background: When I create a ASP.NET control (User or custom), it often requires security to be set for certain functionality with the control. For example, a news release user control that is...
7
by: Magdelin | last post by:
Hi, My security team thinks allowing communication between the two IIS instances leads to severe security risks. Basically, we want to put our presentation tier on the perimeter network and the...
0
by: Jay C. | last post by:
Jay 3 Jan. 11:38 Optionen anzeigen Newsgroups: microsoft.public.dotnet.framework.webservices.enhancements Von: "Jay" <p.brunm...@nusurf.at> - Nachrichten dieses Autors suchen Datum: 3 Jan...
3
by: Velvet | last post by:
I ran FxCop on one of the components for my web site and the security rules what me to add " tags like the ones listed below: This breaks my ASP.NET application. So my question is,...
1
by: Jeremy S. | last post by:
..NET's code Access Security enables administrators to restrict the types of things that a .NET application can do on a local computer. For example, a ..NET Windows Forms application can be...
2
by: Budhi Saputra Prasetya | last post by:
Hi, I managed to create a Windows Form Control and put it on my ASP .NET page. I have done the suggestion that is provided by modifying the security settings. From the stack trace, I would...
0
by: ryjfgjl | last post by:
ExcelToDatabase: batch import excel into database automatically...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
1
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
0
by: ArrayDB | last post by:
The error message I've encountered is; ERROR:root:Error generating model response: exception: access violation writing 0x0000000000005140, which seems to be indicative of an access violation...
1
by: PapaRatzi | last post by:
Hello, I am teaching myself MS Access forms design and Visual Basic. I've created a table to capture a list of Top 30 singles and forms to capture new entries. The final step is a form (unbound)...
1
by: Shællîpôpï 09 | last post by:
If u are using a keypad phone, how do u turn on JavaScript, to access features like WhatsApp, Facebook, Instagram....
0
by: af34tf | last post by:
Hi Guys, I have a domain whose name is BytesLimited.com, and I want to sell it. Does anyone know about platforms that allow me to list my domain in auction for free. Thank you
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.