473,379 Members | 1,355 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,379 software developers and data experts.

User Data Maintenance users

We run DB2 UDB v8.1 on Windows. How do I find the list of all users that
have the following privileges:

1. User Data Maintenance
2. System Tabale Maintenance
Nov 12 '05 #1
1 1561
Jani Tamminen wrote:
We run DB2 UDB v8.1 on Windows. How do I find the list of all users that
have the following privileges:

1. User Data Maintenance
I guess you are interested in the users that have INSERT, UPDATE, DELETE and
CONTROL privileges on tables? Query the catalog view SYSCAT.TABAUTH.
2. System Tabale Maintenance


By "system tables" do you mean the database catalog? There is a set of
privileges for schemata, triggers, functions and the like. Have a look at
the proper catalog view to determine which user or group has privileges on
those objects and also query SYSCAT.DBAUTH to get the information which
user (or group) has which database-wide privileges.

--
Knut Stolze
DB2 Information Integration Development
IBM Germany
Nov 12 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

5
by: Mark S | last post by:
I have a db maintenance plan which is set to backup (then truncate hopefully) the transaction log. In order to backup a transaction log the db must be in single user mode so the maint. plan fails. ...
4
by: derekbarrett | last post by:
Hi all, Our business is in manufacturing, and we are running SAP on DB2 8.1, planning on upgrading to 8.2.2 within a couple of months. We are running operations 24/7, so are looking for ways to...
4
by: James | last post by:
I have a VB windows forms application that accesses a Microsoft Access database that has been secured using user-level security. The application is being deployed using No-Touch deployment. The...
1
by: James | last post by:
I have a VB windows forms application that accesses a Microsoft Access database that has been secured using user-level security. The application is being deployed using No-Touch deployment. The...
1
by: swestenra | last post by:
I am trying to build a screen scraper. But not just a plain screen scraper, it must also automate the entry of data. Background: We have a new intranet system that goes in to production soon. ...
1
by: mkhmer | last post by:
Hello, I want to have my site able to alert User and then Disconnect all current user from accessing the pages for website maintenance purpose. If anyone have any idea of this aiming? ...
4
by: Mark Baldwin | last post by:
I have an application with both Windows Forms and ASP.NET front ends and uses both integrated web security and a security database. The problem I have is that I need to syncronize these security...
4
by: vunet.us | last post by:
I want to know if this practice is effective and secure: I have been thinking about storing some data, which my users upload, in text files rather than database, since often I do not know how much...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.