Use Technology Explorer for IBM DB2 to manage user and group authentication for DB2 for Linux, UNIX, and Windows
Controlling the db2auth plug-in from the Technology Explorer
From the developerWorks archives
Date archived: January 12, 2017 | Last updated: November 13, 2009|First published: November 05, 2009
Learn how to use the Technology Explorer (TE) for IBM DB2® to control user and group authentication to DB2 through the use of a security plug-in called db2auth. The plug-in uses a DB2 database for storing authentication information instead of an external authentication repository, such as an operating system or Kerberos. The plug-in allows for a smoother migration from other database software such as MySQL, which also stores authentication information within the database. This article also describes how the support in TE for the db2auth plug-in was implemented. [2009 Nov 13: Updated to show Linux support. --Ed.]
This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some steps and illustrations may have changed.