Planning RACF security for Db2
The most significant part of the planning process is planning to expand RACF protection and administration to Db2 subsystem resources.
Plan to cover the following tasks.
- Examining the current RACF environment, including the user group structure, resource naming conventions, and use of grouping classes.
- Examining the Db2 objects, looking for naming conventions and other similarities in resource names that you can exploit with generic RACF profiles.
- Examining the GRANT authorizations in place for Db2 objects to see which RACF user groups you can define, or exploit, to reduce the RACF authorizations you must create using the RACF PERMIT command.
- Planning which Db2 objects and administrative authorities to protect, determining access requirements, and incorporating the new subsystem resources into the current RACF structure.
- Considering the use of RACF variables to facilitate resource naming conventions for Db2 resources.
- Integrating new Db2 users into the RACF user structure and delegating RACF group and class authorities.