10.9. Summary

This chapter introduced the DB2 security model. To connect to a DB2 database, user and password authentication is performed outside of DB2 using the security facility provided by the operating system of the DB2 server, by Kerberos, or through customized security plug-ins. Security plug-ins are loadable library modules that implement security mechanisms to be used for user authentication.

Setting the authentication type at the DB2 server and client determines where authentication will take place. At the DB2 server, authentication type is defined in the Database Manager Configuration file. DB2 clients specify an authentication type for each database it connects to when the database is being cataloged.

Once a user is successfully authenticated, ...

Get Understanding DB2®: Learning Visually with Examples now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.