?
Solved

error :SQL0551N

Posted on 2013-05-30
2
Medium Priority
?
1,218 Views
Last Modified: 2013-07-04
Hi getting this error while accesing the tables: running the commands from db2 client v9.7

SQL0551N "db2v95" does not have the required authorization or privilege
to perform operation "EXECUTE" on object "NULLID.SQLC2H21". SQLSTATE=42501


thought this could be because of bind issues and ran the bind commands, but still same error.
also granted bindadd grant on the db to the user.

followed the following link for solution but still the error is not resolved..
http://www-01.ibm.com/support/docview.wss?uid=swg21440573

Please let me know if I am missing anything?
0
Comment
Question by:jmartin_v
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 37

Accepted Solution

by:
momi_sabag earned 1500 total points
ID: 39208735
"followed the following link for solution but still the error is not resolved.. "

did you grant execute to public?
0
 

Author Comment

by:jmartin_v
ID: 39209032
Hi Momi,

yes granted execute on the object to public as well as to the user
0

Featured Post

Prepare for your VMware VCP6-DCV exam.

Josh Coen and Jason Langer have prepared the latest edition of VCP study guide. Both authors have been working in the IT field for more than a decade, and both hold VMware certifications. This 163-page guide covers all 10 of the exam blueprint sections.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

November 2009 Recently, a question came up in the DB2 forum regarding the date format in DB2 UDB for AS/400.  Apparently in UDB LUW (Linux/Unix/Windows), the date format is a system-wide setting, and is not controlled at the session level.  I'm n…
Recursive SQL in UDB/LUW (it really isn't that hard to do) Recursive SQL is most often used to convert columns to rows or rows to columns.  A previous article described the process of converting rows to columns.  This article will build off of th…
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question