DB2 Security, Part 11, Develop a security plug-in for DB2 database authentication

How to design and develop a DB2 security plug-in that authenticates user and group information stored in a DB2 database

From the developerWorks archives

Gene Kligerman

Date archived: February 23, 2017 | Last updated: November 25, 2009|First published: February 28, 2008

This article describes the design and development of a DB2® for Linux®, UNIX®, and Windows® security plug-in that retrieves user ID, group, and group membership information from a local or remote DB2 database. Use of this plug-in allows for the development of database applications that do not rely on an external authentication mechanism, such as an operating system. Accompanying this article is a working implementation of the security plug-in ported to Windows, Linux, and AIX operating systems. This article is a continuation of the series of articles about DB2 security.

This article has been updated with additional information on the administrator user interface and support for Linux and AIX.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Information Management
ArticleID=291983
ArticleTitle=DB2 Security, Part 11: Develop a security plug-in for DB2 database authentication
publish-date=11252009