Implement DB2 for Linux, UNIX, and Windows trusted contexts and roles in a Web application

One IBM Business Partner's experiences with new security options in DB2 9.5

From the developerWorks archives

Matt Eakle and Ted Wasserman

Date archived: January 11, 2017 | First published: March 20, 2008

Explore how a Web application makes use of trusted contexts, roles, and new auditing capabilities in IBM® DB2® 9.5 for Linux®, UNIX®, and Windows®. Get the "before-and-after" story of how these features were implemented at S1 Corporation.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Information Management
ArticleID=295677
ArticleTitle=Implement DB2 for Linux, UNIX, and Windows trusted contexts and roles in a Web application
publish-date=03202008