This chapter discusses the security concepts that are important in running Siebel Business Applications on DB2 for z/OS. This chapter also describes the roles and permissions you require to implement the Siebel application on DB2 for z/OS and to set up a connection between the Siebel Server and the Siebel DB2 for z/OS database. For a general discussion of Siebel architecture, including a discussion of supported client types, refer to Siebel Deployment Planning Guide and Siebel Installation Guide for the operating system you are using. This chapter describes the following topics:
|