TechTip: Impersonate Your Neighbor Using DB2 for i This is an off-site link.  Please review our Terms of Service for additional information.

(Michael Sansoterra) For most database-related applications, using adopted authority is the preferred way to temporarily grant users controlled access to sensitive data. But one limitation of the adopted authority model is that it doesn't override IFS permissions.

Read this article...

comments powered by Disqus