Upload
tess98
View
503
Download
1
Tags:
Embed Size (px)
Citation preview
BACKGROUND
IBM DB2 is a universal database that has a long
history and was what some consider being the first
database product to use SQL. The name DB2
was first given to the Database Management
System or DBMS in 1982 where IBM released
SQL/DS and DB2 on its mainframe platform.
The first DB2 product was released in 1984 on the
IBM mainframe platform.
BACKGROUND
Prior to this the product was named SystemRelational, or System R, which launched in1978. DB2 has its roots back to thebeginning of the seventies where Dr. E.F.Codd who works for IBM, described thetheory of relational databases and in Juneof 1970 published the model for datamanipulation.
BACKGROUND
To apply the model, Codd needed a relational database language which he named Structured English Query Language or SEQUEL. SEQUEL was already a trademarked name, so IBM renamed the acronym to SQL, short for Structured Query Language. The acronymSQL still stands to this day.
BACKGROUND
In 2001 IBM bought Informix and in thefollowing years incorporated Informix technology into the DB2 product suite.
IMB increased its product in areas such asTransaction processing, Query processing, parallelprocessing and optimization.Technically today, DB2 can be considered to be anobject-relational database. IBM DB2 software ismodeled and specified using the Unified ModelingLanguage. (UML)
DB2 DIFFERENT EDITIONS
Enterprise server edition (ESE)Workgroup server edition (WSE)Workgroup server unlimited editionPersonal editionUniversal developer’s edition Personal developer’s edition
DB2 supports
JOIN AGGREGATION SET OPERATIONS COMPLEX SQL PROCESSING CONSTRAINT AND INTEGRITY CONCURRENCY CONTROL RECOVERY CONCURRENCY AND ISOLATION
AUTHENTICATION AND SECURITY
The DB2 UDB security model consists of two main components:
authentication and authorization
AUTHENTICATION
Authentication is the process of validating a supplied user ID and password using a security
mechanism.
User and group authentication is managed in a facility external to DB2 UDB, such as the operating
system, a domain controller, or a Kerberos security system.
This is different from other database management systems (DBMSs), such as Oracle and SQL Server.
ERROR DETECTION
SQL30082N Attempt to establish connection failed with security reason "24" ("USERNAME AND/OR PASSWORD INVALID"). SQLSTATE=08001
This message is returned to the application by DB2 UDB when user authentication fails
AUTHORIZATION• Authorization is the process of determining access and
privilege information about specific database objects and actions for a supplied user ID.
• DB2 UDB stores and maintains user and group authorization information internally.
• Each time you submit a command, DB2 UDB performs authorization checking to ensure that you have the correct set of privileges to perform that action.
• Privileges can be granted to specific users or to groups of users. Again, both the user and group definition themselves are defined outside of DB2 UDB.
• Users that are a member of a group automatically inherit the group's privileges.
AUTHORIZATION
1. Grant select on table Employee to user Kevin
2. Revoke insert on view customer from group 18
3. Grant select on table Machine to user xyz
Most database objects have a set of associated privileges that can be assigned to users and groups, using the SQL statements GRANT and REVOKE. For example
AUTHORIZATION
ERROR DETECTION
If a user is not authorized to perform an operation against a specific object, DB2 UDB refuses the operation and returns an error message to the client application.
For example, if the user Phillip tried to INSERT a row into the Employee table, but did not have sufficient privileges to do so, the following error message would be returned:
DB21034E The command was processed as an SQL statement because it was not a valid Command Line Processor command. During SQL processing it returned: SQL0551N “Phillip" does not have the privilege to perform operation "INSERT" on object “Employee". SQLSTATE=42501
This message is returned by DB2 UDB when user authorization fails
IBM DB2 ADVANTAGES
IBM DB2 Runs on all types of platforms including Windows, Linux, AIX, HP-UX, Sun Solaris
Integrated web access Data replication service Integrated system management tools Integrated support for complex data IBM program for assistance to developers
IBM DB2 DISADVANTAGES
IBM DB2 is very expensive due to its different editions.
The database server do not supports online analytical processing and Data mining
IBM DB2 uses a lot of memory space
REFERENCES
Silberschatz, A (et. Al) Database Systems Concepts
http://www.databasesecurity.com/db2/secdb2.htm
http://www-128.ibm.com/developerworks/db2/library/techarticle/dm-0512patil/
http://www-128.ibm.com/developerworks/db2/library/techarticle/dm-0508wasserman/index.html
http://publib.boulder.ibm.com/infocenter/db2luw/v8//index.jsp?topic=/com.ibm.db2.udb.doc/admin/c0005435.htm
AUTHORIZATION
AUTHORIZATION
&Coming to a lecture theatre near you!
Next Week Monday
Live Demonstrations of
&Coming to a lecture theatre near you!
Next Week Monday
Live Demonstrations of