Maintain Users

To log into an Agate Framework application, the user id must exist in this authorized users table. 

A user can be authorized to display, add, change, or delete data.

User authorizations supersede command and program authorizations.

Each data table contains transaction time and user id columns.  When data rows are inserted or updated, the row is time stamped with the current time and logged in user id.  These columns support the framework's optimistic locking algorithm.  With optimistic locking, data is not locked when displayed for change.  This technique minimizes locking interference and deadlock.

DB2 uses the operating system list of valid users to authenticate a user's id and password.  The user must also be granted privileges to access database resources,  either individually or by making the user a member of a database group.  Both these tasks are completed using operating system and database utility programs.