This chapter discusses the security concepts that are important in running Siebel Business Applications on DB2 for z/OS. This chapter also describes the roles and permissions you require to set up a connection between the Siebel Server and the Database Server residing on the DB2 host and to install the Siebel application on the Database Server. For a general discussion of Siebel architecture, including a discussion of supported client types, refer to the Deployment Planning Guide and the Siebel Installation Guide for the operating system you are using. This chapter describes the following topics:
|