DB2 DBA 6 to 8 years Pune location

DB2 DBA - Pune Location

Experience in archiving and backup of transaction logs Gathering statistics
Experience in database setup properly as it is supposed to be, etc.
Security administrators can control access to their databases in a way that mirrors the structure of their organizations (they can create roles in the database that map directly to the job functions in their organizations).
Users are granted membership in the roles that reflect their job responsibilities.
As their job responsibilities change, their membership in roles can be easily granted and revoked.
The assignment of privileges is simplified. Instead of granting the same set of privileges to each individual user in a particular job function, the administrator can grant this set of privileges to a role representing that job function and then grant that role to each user in that job function. A role's privileges can be updated and all users who have been granted that role receive the update, the administrator does not need to update the privileges for every user on an individual basis. The privileges and authorities granted to roles are always used when you create views, triggers, materialized query tables (MQTs), static SQL and SQL routines, whereas privileges and authorities granted to groups (directly or indirectly) are not used. This is because the DB2? database system cannot determine when membership in a group changes, as the group is managed by third-party software (for example, the operating system or an LDAP directory). Because roles are managed inside the database, the DB2 database system can determine when authorization changes and act accordingly. Roles granted to groups are not considered, due to the same reason groups are not considered. All the roles assigned to a user are enabled when that user establishes a connection, so all privileges and authorities granted to roles are taken into account when a user connects. Roles cannot be explicitly enabled or disabled. The security administrator can delegate management of a role to others 

Candidate should have minimum of 4 years of experience.
Minimum 4 years of experience in archiving and backup of transaction logs Gathering statistics.
Experience in database setup properly as it is supposed to be, etc.
Security administrators can control access to their databases in a way that mirrors the structure of their organizations (they can create roles in the database that map directly to the job functions in their organizations).

 

Regards,

Aliya Naz