Previous Topic Next topic Print topic


Security and Access Control

Table access may be performed interactively, or through a program running in batch mode, or through a CICS or IMS transaction. In all cases it is necessary to control access to the system and to the data stored in table objects. The XDB Server controls access to the system using Authorization IDs (AuthIDs) and passwords. The XDB Server controls access to location objects using privileges. The XDB Server supports both explicit and implicit privileges.

Previous Topic Next topic Print topic