DB2 security, Part 10, Deploy customized security plug-ins in DB2 9

From the developerWorks archives

Kevin Yeung-Kuen See and Yung Chung

Date archived: February 28, 2017 | First published: October 19, 2006

Security plug-ins bring new versatility to your database security setup in IBM® DB2® 9. Read this article to determine what should be tested before deploying your own customized security plug-ins. Accompanying this article, there is a security plug-in loader program for AIX® 64 bit, Linux® AMD 64 bit, Linux AMD 32 bit, Linux IA 32 bit, and Sun Solaris 64 bit operating system platforms. This loader enables the reader to perform sanity testing on the security plug-in code before hooking up with DB2 for further testing. This article also discusses how to take advantage of the new enhancements to the security plug-in infrastructure in DB2 9.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.

Zone=Information Management
ArticleTitle=DB2 security, Part 10: Deploy customized security plug-ins in DB2 9