TechTip: DB2 for i Impersonation Take 2: External Routines This is an off-site link.  Please review our Terms of Service for additional information.

(Michael Sansoterra) In "Impersonate Your Neighbor Using DB2 for i," I outlined how to use the SET SESSION AUTHORIZATION SQL statement to override the user profile of the current thread or, in many cases, the current job. The benefits of doing this include providing temporary authorization to resources such as IFS files and impersonating another user so that user-dependent code will be tricked into thinking that a different user is running it.

Read this article...

comments powered by Disqus