DB2 Security, Part 11, Develop a security plug-in for DB2 database authentication
How to design and develop a DB2 security plug-in that authenticates user and group information stored in a DB2 database
From the developerWorks archives
Date archived: February 23, 2017 | Last updated: November 25, 2009|First published: February 28, 2008
This article describes the design and development of a DB2® for Linux®, UNIX®, and Windows®
security plug-in that retrieves
user ID, group, and group membership information from a local or remote DB2 database.
Use of this plug-in allows for the development of database applications that do not
rely on an external authentication mechanism, such as an operating system.
Accompanying this article is a working implementation of the security plug-in ported to Windows, Linux,
and AIX operating systems. This article is a continuation of the series of articles about
This article has been updated with additional information on the administrator user interface and support for Linux and AIX.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.