473,224 Members | 1,968 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,224 software developers and data experts.

DB2 UDB Security

Hello,
I am using the following:
DB2 UDB V8.1.1
AIX 5L

I need to know if there is a way to set up a table so that a particular
group has read access to all of the rows in the table and update
authority to only one of the columns in the rows.

Any help will be appreciated.

Thanks.

Nov 12 '05 #1
7 1617
bka
You should look into views to accomplish this.

Nov 12 '05 #2
Thanks for the suggestion.

I finally found a grant that I can use in the SQL Reference manual that
will do the trick. This form of the grant allows specific priviledges
to be granted on a column.

Thanks again.

Nov 12 '05 #3
Hi,
I have never before heard of this feature in DB2 UDB on LUW.

Please also let us know the exact syntax of the command where you can
grant specific priviledges on a column to any user / group.

TiA..........anurag
da*******@yahoo.com wrote:
Thanks for the suggestion.

I finally found a grant that I can use in the SQL Reference manual that
will do the trick. This form of the grant allows specific priviledges
to be granted on a column.

Thanks again.


Nov 12 '05 #4
Hi,
I have never before heard of this feature in DB2 UDB on LUW.

Please also let us know the exact syntax of the command where you can
grant specific privileges on a column to any user / group.

TiA..........anurag
da*******@yahoo.com wrote:
Thanks for the suggestion.

I finally found a grant that I can use in the SQL Reference manual that
will do the trick. This form of the grant allows specific priviledges
to be granted on a column.

Thanks again.


Nov 12 '05 #5
Anurag wrote:
I have never before heard of this feature in DB2 UDB on LUW.
Please also let us know the exact syntax of the command where you can
grant specific privileges on a column to any user / group.

The feature was added as part of FIPS compliance in I believe DB2 UDB V5.
It's not a very commonly used feature because views to a much better
job. But whomever specified FIPS apparently didn't know that.
Another rather useless feature added for FIPS was CREATE SCHEMA...

Cheers
Serge
--
Serge Rielau
DB2 SQL Compiler Development
IBM Toronto Lab
Nov 12 '05 #6
It has its uses; consider the way IBM implemented their "text extender" by
automatically adding a column to the table.
"Serge Rielau" <sr*****@ca.ibm.com> wrote in message
news:3l*************@individual.net...
Anurag wrote:
I have never before heard of this feature in DB2 UDB on LUW.
Please also let us know the exact syntax of the command where you can
grant specific privileges on a column to any user / group.

The feature was added as part of FIPS compliance in I believe DB2 UDB V5.
It's not a very commonly used feature because views to a much better job.
But whomever specified FIPS apparently didn't know that.
Another rather useless feature added for FIPS was CREATE SCHEMA...

Cheers
Serge
--
Serge Rielau
DB2 SQL Compiler Development
IBM Toronto Lab

Nov 12 '05 #7
Sorry it took me so long to get back to this.

Using a view to address my issue just wouldn't work. I needed to allow
my users to see all of the data in each row of the table. Within the
same transaction they needed to be abe to update an indicator field.
Because the programmers were attempting to present this data via a
spreadsheet and not use a program of any kind to control the access I
needed a way for the DB2 catalog info to control what was done to the
rows and columns (the security/authority).

The exact syntax for this form of a grant can be found in the SQL
Refrence Vol II manual. For DB2 V8.1 this starts on page 590 with
specific reference to the column information on page 593.

I hope this helps.

Good luck.

Nov 12 '05 #8

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

2
by: robert | last post by:
well, talk about timely. i'm tasked to implement a security feature, and would rather do so in the database than the application code. the application is generally Oracle, but sometimes DB2. ...
116
by: Mike MacSween | last post by:
S**t for brains strikes again! Why did I do that? When I met the clients and at some point they vaguely asked whether eventually would it be possible to have some people who could read the data...
4
by: Ashish | last post by:
Hi Guys I am getting the following error while implementing authentication using WS-security. "Microsoft.Web.Services2.Security.SecurityFault: The security token could not be authenticated...
0
by: prithvi g via .NET 247 | last post by:
Hi I am a newbie to .NET remoting, I am trying to implementauthorization using SSPI example provided by Michael Barnett. Ihave included the required dll(Microsoft.Samples.Security.SSPI.dll...
1
by: Earl Teigrob | last post by:
Background: When I create a ASP.NET control (User or custom), it often requires security to be set for certain functionality with the control. For example, a news release user control that is...
7
by: Magdelin | last post by:
Hi, My security team thinks allowing communication between the two IIS instances leads to severe security risks. Basically, we want to put our presentation tier on the perimeter network and the...
0
by: Jay C. | last post by:
Jay 3 Jan. 11:38 Optionen anzeigen Newsgroups: microsoft.public.dotnet.framework.webservices.enhancements Von: "Jay" <p.brunm...@nusurf.at> - Nachrichten dieses Autors suchen Datum: 3 Jan...
3
by: Velvet | last post by:
I ran FxCop on one of the components for my web site and the security rules what me to add " tags like the ones listed below: This breaks my ASP.NET application. So my question is,...
1
by: Jeremy S. | last post by:
..NET's code Access Security enables administrators to restrict the types of things that a .NET application can do on a local computer. For example, a ..NET Windows Forms application can be...
2
by: Budhi Saputra Prasetya | last post by:
Hi, I managed to create a Windows Form Control and put it on my ASP .NET page. I have done the suggestion that is provided by modifying the security settings. From the stack trace, I would...
0
by: veera ravala | last post by:
ServiceNow is a powerful cloud-based platform that offers a wide range of services to help organizations manage their workflows, operations, and IT services more efficiently. At its core, ServiceNow...
3
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 3 Jan 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). For other local times, please check World Time Buddy In...
0
by: jianzs | last post by:
Introduction Cloud-native applications are conventionally identified as those designed and nurtured on cloud infrastructure. Such applications, rooted in cloud technologies, skillfully benefit from...
0
by: mar23 | last post by:
Here's the situation. I have a form called frmDiceInventory with subform called subfrmDice. The subform's control source is linked to a query called qryDiceInventory. I've been trying to pick up the...
0
by: abbasky | last post by:
### Vandf component communication method one: data sharing ​ Vandf components can achieve data exchange through data sharing, state sharing, events, and other methods. Vandf's data exchange method...
2
by: jimatqsi | last post by:
The boss wants the word "CONFIDENTIAL" overlaying certain reports. He wants it large, slanted across the page, on every page, very light gray, outlined letters, not block letters. I thought Word Art...
0
by: fareedcanada | last post by:
Hello I am trying to split number on their count. suppose i have 121314151617 (12cnt) then number should be split like 12,13,14,15,16,17 and if 11314151617 (11cnt) then should be split like...
0
Git
by: egorbl4 | last post by:
Скачал я git, хотел начать настройку, а там вылезло вот это Что это? Что мне с этим делать? ...
1
by: davi5007 | last post by:
Hi, Basically, I am trying to automate a field named TraceabilityNo into a web page from an access form. I've got the serial held in the variable strSearchString. How can I get this into the...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.