Authentication methods for your server
Access to an instance or a database first requires that
the user be authenticated. The authentication type for
each instance determines how and where a user will be verified.
Partitioned database authentication considerations
In a partitioned database, each partition of the database
must have the same set of users and groups defined. If the definitions
are not the same, the user may be authorized to do different things
on different partitions.
Kerberos authentication
Kerberos is a third-party network authentication protocol
that employs a system of shared secret keys to securely authenticate
a user in an unsecured network environment. The DB2 database system provides support for the
Kerberos authentication protocol on AIX®,
HP-UX, Solaris, Linux IA32
and AMD64, and Windows operating
systems.
Maintaining passwords on servers
You might be required to perform password maintenance tasks.
Because such tasks are typically required at the server, and many
users are not able or comfortable working with the server environment,
performing these tasks can pose a significant challenge. The DB2 database system provides a way
to update and verify passwords without having to be at the server.