4.2.37 Restrict Access to SYSCAT.SURROGATEAUTHIDS

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The SYSCAT.SURROGATEAUTHIDS view contains the names of all accounts that have been granted SETSESSIONUSER privilege on a user or to PUBLIC. It is recommended that the PUBLIC role be restricted from accessing this view.

Rationale:

PUBLIC should not be able to view the names of all the surrogate accounts with SETSESSIONUSER privilege.

Solution

Perform the following to revoke access from PUBLIC.

Connect to the Db2 database.

db2 => connect to <dbname>

Run the following command:

db2 => REVOKE SELECT ON SYSCAT.SURROGATEAUTHIDS FROM PUBLIC

See Also

https://workbench.cisecurity.org/files/4033