O'Reilly logo

Understanding DB2® 9 Security: DB2® Information Management Software by Yuk-Kuen Henry Chan, Carmen Ka Man Wong, Kevin Yeung-Kuen See, Rebecca Bond

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Understanding Identification and Authentication—The First Line of Defense

An imaginary conversation between the DB2 database and the user ID:

image

First Words: Why Is Authentication Critical to Database Security?

When a user claims a specific identity, such as entering a user ID, this process is called identification. Authentication is the process by which the claimed user identity is validated. Authentication is the first line of defense for the DB2 database system; it serves as preventive control to stop any unwanted access to the database. The role authentication plays for DB2 is much like that of the firewall for the corporate network. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required