Trusted Context and Roles – How are you serving up your security?

Abstract:
Practical approaches to how to utilize these DB2 constructs to manage access and ownership of your objects and data. Using ROLE's to own and manage your objects and data can remove auth IDs and groups from the security picture. Useful information allowing you to verify whether you’re environment is as secure as you think it is!
Objective 1: Introduce and define the concepts of Trusted Context and Role
Objective 2: Illustrate how to utilize Role - WITH ROLE AS OBJECT OWNER--AND QUALIFIER
Objective 3: Illustrate implications when using ROLE vs AUTHID and GROUPS

https://ibm.box.com/s/1a4d9tld29jpgxm7ms3vuopi6g8fhp8e