Implement DB2 for Linux, UNIX, and Windows trusted contexts and roles in a Web application
One IBM Business Partner's experiences with new security options in DB2 9.5
From the developerWorks archives
Date archived: January 11, 2017 | First published: March 20, 2008
Explore how a Web application makes use of trusted contexts, roles, and new auditing capabilities in IBM® DB2® 9.5 for Linux®, UNIX®, and Windows®. Get the "before-and-after" story of how these features were implemented at S1 Corporation.
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.