Row and Column Access Control support in DB2 for IBM i
This IBM Redpaper publication provides information about the IBM i 7.2 feature of DB2 for i Row and Column Access Control (RCAC). It offers a broad description of the function and advantages of controlling access to data in a comprehensive and transparent way. This publication helps you understand the capabilities of RCAC and provides examples of defining, creating, and implementing the row permissions and column masks in a relational database environment.
This paper is intended for database engineers, data centric application developers, and security officers who want to design and implement RCAC as a part of their data control and governance policy. A solid background in IBM i object level security, DB2 for i relational database concepts and SQL is assumed.
Related Blog Posts
Table of contents
Chapter 1. Securing and protecting DB2 data
Chapter 2. Roles and separation of duties
Chapter 3. Row and column access control
Chapter 4. Implementing RCAC using a banking example
Chapter 5. RCAC and non-SQL interfaces
Chapter 6. Additional considerations
Chapter 7. RCAC management
Chapter 8. Designing and planning for success
These pages are Web versions of IBM Redbooks- and Redpapers-in-progress. They are published here for those who need the information now and may contain spelling, layout and grammatical errors.
This material has not been submitted to any formal IBM test and is published AS IS. It has not been the subject of rigorous review. Your feedback is welcomed to improve the usefulness of the material to others.
IBM assumes no responsibility for its accuracy or completeness. The use of this information or the implementation of any of these techniques is a customer responsibility and depends upon the customer's ability to evaluate and integrate them into the customer's operational environment.