Understand the trusted context feature in Informix

Secure connections with IBM Informix JDBC, ODBC and ESQL/C drivers

From the developerWorks archives

Mamta Sharma, Tapan Ghosh, and Kollol Misra

Date archived: January 13, 2017 | First published: May 10, 2012

The use of connection pooling to data sources can lead to role-based security breaches. Support for trusted connections and trusted contexts in IBM® Informix® server gives the flexibility of connection reuse, granting of controlled privileges to the middle tier, and enhanced user accountability in a three-tier application without compromising database security, all while improving system performance. This article discusses trusted connections and trusted contexts, and shows how to manage trusted contexts using JDBC, ESQL/C and ODBC drivers.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Information Management
ArticleID=813445
ArticleTitle=Understand the trusted context feature in Informix
publish-date=05102012