Which three facilities are used to control authorization in DB2?
Which three facilities are used to control authorization in DB2?
In DB2, authorization is controlled using privileges, authority levels, and Label-Based Access Control (LBAC) credentials. Privileges determine what actions users can perform, authority levels provide hierarchical administrative controls, and LBAC credentials provide fine-grained access control to data.
D. privileges, authority levels, LBAC credentials is good
- The db2ssh is a wrapper around the Secure Shell (SSH) protocol and Secure Copy Protocol. db2ssh is used to configure and deploy Db2 PureScale Feature. - Certificates are used to secure connection and communication. - A trusted context is a database object that defines a trust relationship for a connection between the database and an external entity such as an application server. - Label-based access control (LBAC) greatly increases the control you have over who can access your data. - Users can successfully execute operations only if they have the authority and sufficents priviliges to perform the specified function or operations.