Use Technology Explorer for IBM DB2 to manage user and group authentication for DB2 for Linux, UNIX, and Windows

Controlling the db2auth plug-in from the Technology Explorer

From the developerWorks archives

Misa Sakamoto

Date archived: January 12, 2017 | Last updated: November 13, 2009|First published: November 05, 2009

Learn how to use the Technology Explorer (TE) for IBM DB2® to control user and group authentication to DB2 through the use of a security plug-in called db2auth. The plug-in uses a DB2 database for storing authentication information instead of an external authentication repository, such as an operating system or Kerberos. The plug-in allows for a smoother migration from other database software such as MySQL, which also stores authentication information within the database. This article also describes how the support in TE for the db2auth plug-in was implemented. [2009 Nov 13: Updated to show Linux support. --Ed.]

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Information Management, Open source
ArticleID=444290
ArticleTitle=Use Technology Explorer for IBM DB2 to manage user and group authentication for DB2 for Linux, UNIX, and Windows
publish-date=11132009