Community

TechTip: Impersonate Your Neighbor Using DB2 for i

(Michael Sansoterra) For most database-related applications, using adopted authority is the preferred way to temporarily grant users controlled access to sensitive data. But one limitation of the adopted authority model is that it doesn’t override IFS permissions.

Read More - Register for Free Membership

Tags: