Solved

Question on SYSADM

Posted on 2002-05-20
2
304 Views
Last Modified: 2012-06-27
I have read that when a user (Administrator on Windows 2000) installs DB2, any user account that belongs to the Adminstrators group in the system will have SYSADM authority on the default DB2 instance. I checked my DB2 server and found that the SYSADM_GROUP was not assigned to any group. Why isn't it assigned to the Administrators group after the installation? If SYSADM_GROUP is not assigned, that means nobody has SYSADM authority. How can this be?
0
Comment
Question by:yongsing
2 Comments
 
LVL 13

Accepted Solution

by:
ghp7000 earned 50 total points
ID: 7033287
The user name you used to install DB2, typically db2admin, is the owner of the service that DB2 needs in order to run under Win2000. The user name you used to install must be in the admin group under Windows, otherwise an error is returned during installation.
After install is complete, you can control the authority level of all the users by assigning a name to the SYSADM_GROUP with command line command:
db2 update dbm cfg using SYSADM_GROUP (group_name)
then
db2stop
db2start
Now, only users in (group_name) have sysadm authority, if you don't do this, all users have in Win2000 administrator group have sysadm authority on the INSTANCE and the databases running under that instance.
In fact, the default setup of DB2 is that all users in windows admin group get sysadm authority unless you change it.
Regards
0
 
LVL 9

Author Comment

by:yongsing
ID: 7033646
>> In fact, the default setup of DB2 is that all users in
>> windows admin group get sysadm authority unless
>> you change it.

But the SYSADM_GROUP is initially not assigned to any group (as can be seen with "get dbm cfg"), so how can all users in the windows admin group get this authority?

If the SYSADM_GROUP is not assigned initially, then nobody is SYSADM, isn't it? How can this be?
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Recursive SQL in UDB/LUW (you can use 'recursive' and 'SQL' in the same sentence) A growing number of database queries lend themselves to recursive solutions.  It's not always easy to spot when recursion is called for, especially for people una…
Recursive SQL in UDB/LUW (it really isn't that hard to do) Recursive SQL is most often used to convert columns to rows or rows to columns.  A previous article described the process of converting rows to columns.  This article will build off of th…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now