Yes, your workout seems correct - although I would also try su (without the -). I expect the domain remains in effect as su - is meant to perform the entire login procedure, but not change the RUID for accounting - whereas su (without the minus) does not go through the login process.
So, the basic question - is it your intent to keep user0X from being able to su - in any form - to db2inst1?
If yes, the following will prevent all users from su to db2inst1 unless they are in the group db2suok
# mkgroup db2suok
# chuser sugroups=db2suok
To permit a user (e.g., michael, u203 and u204) to su to db2inst1 use chgrpmem:
michael@x054:[/home/michael]chgrpmem
Usage: chgrpmem [-R load_module] [ { -a | -m } { + | - | = } user1,user2 ... ] group
# grep db2suok /etc/group
db2suok:!:202:rbooks
# chgrpmem -R files -m + michael,u204,u203 db2suok
# grep db2suok /etc/group
db2suok:!:202:rbooks,michael,u204,u203
And to remove them again use:
# chgrpmem -R files -m - michael,u204,u203 db2suok
# grep db2suok /etc/group
db2suok:!:202:rbooks