Ways to control access to Db2 subsystems
Db2 for z/OS® performs security checks to authenticate users before they gain access to Db2 data. A variety of authentication mechanisms are supported by Db2 requesters and accepted by Db2 servers.
Authentication occurs when the CONNECT statement is issued to connect the application process to the designated server. The server or the local Db2 subsystem checks the authorization ID and password to verify that the user is authorized to connect to the server.
You can use RACF® or the z/OS Security Server to authenticate users that access a Db2 database.