By default, System Administrative (SYSADM) authority is granted to the following:
For example, if a user logs on to a domain account and tries to access a DB2 database, DB2 will go to a Domain Controller to enumerate groups (including the Administrator's group). You can change this behavior in either of two ways:
| By default, in a Windows NT domain environment , only domain users that
belong to the Administrators group at the Primary Domain Controller (PDC) have
SYSADM authority on an instance. Since DB2 always performs
authorization at the machine where the account is defined, adding a domain
user to the local Administrators group on the server does not grant the domain
user SYSADM authority to this group.
To avoid adding a domain user to the Administrators group at the PDC, we suggest that you create a global group and add the users (both domain and local) that you want to grant SYSADM authority. To do so, enter the following commands: db2stop db2 update dbm cfg using sysadm_group global_group db2start |
For information on how to change the default SYSADM settings and how to assign this authority to a different user or set of users, refer to the Administration Guide.