Database security

Database security has two aspects: user verification and user authority.

User verification refers to how you establish that the person using an online database is in fact the person you have authorized.

User authority refers to how you control what users can see and what the users can do with what they see after you verify the user's identity.

These topics deal primarily with how you can control a user's view of data and the user's actions with respect to the data.

Related reading: If you use CICS®, see CICS Transaction Server for z/OS® RACF® Security Guide for information on establishing security.