Security Requirements

Before installing the productgroup, review and address the following security requirements:
dm20
Before installing the
CA Database Management Solutions for DB2 for z/OS
, review and address the following security requirements:
DB2 product authorizations, user authorizations, and other security requirements are described in Security Settings. You can use the Product Authorization Facility to control user privileges for products, log tables, and Db2 system catalog tables.