It's been a few decades so don't remember all the details, but pretty sure we set up a naming convention for RACF groups unique to DB2 secondary authorization  where the group name implied the authorized DB2 secondary authorization IDs,  connected appropriate RACF userids to one or more of those RACF groups, and the DB2 user exit was written to check those RACF group associations of the RACF userid associated with the request to determine what DB2 secondary authorization IDs to assign.   After initial setup, all authorizations were done via adding/removing RACF groups to/from a userid.

    JC Ewing

On 11/23/25 11:10 PM, Jon Perryman wrote:
On Mon, 24 Nov 2025 00:40:47 +0200, Binyamin Dissen 
<[email protected]> wrote:

DB2 query - is there a way to give a specific permission for a user to SET
CURRENT SQLID to another user without special privileges? Something thru the
surrogate class?
I researched (never implemented) this for a project and found that DB2 
secondary authorization id's are implemented through a DB2 user exit. Maybe 
someone has used it but if not, the doc is 
https://www.ibm.com/docs/en/db2-for-zos/13.0.0?topic=applications-using-secondary-ids-sign-requests

I suspect you could implement it using SUROGAT but I suspect there must be a 
reason why IBM chose RACF groups. Hopefully someone has some real experience.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

--
Joel C Ewing

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to