Configuring a DB2 for Linux, UNIX, and Windows Database for Auditing

To configure a DB2 for Linux, UNIX, and Windows database database for auditing, you must set up the privileges described in this section.

  1. Assign at least one of the following privileges to the owners of the audited tables:

    • SYSADM or DBADM

    • ALTER privilege on the table on which the trigger is defined, or ALTERIN privilege on the schema of the table and one of the following privileges:

      -CREATEIN privilege on the schema.

      -IMPLICIT_SCHEMA authority on the database.

  2. Assign the following privileges to all of the JD Edwards EnterpriseOne database proxy users:

    • SELECT privilege on the table.

    • SELECT privilege on any other table or view that the trigger is referencing.

    • Necessary privileges to execute the trigger SQL statement.