Understand the trusted context feature in Informix

Secure connections with IBM Informix JDBC, ODBC and ESQL/C drivers

From the developerWorks archives

Mamta Sharma, Tapan Kumar Ghosh, and Kollol Kumar Misra

Date archived: May 14, 2019 | First published: May 10, 2012

The use of connection pooling to data sources can lead to role-based security breaches. Support for trusted connections and trusted contexts in IBM® Informix® server gives the flexibility of connection reuse, granting of controlled privileges to the middle tier, and enhanced user accountability in a three-tier application without compromising database security, all while improving system performance. This article discusses trusted connections and trusted contexts, and shows how to manage trusted contexts using JDBC, ESQL/C and ODBC drivers.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some content, steps, or illustrations may have changed.

Zone=Information Management
ArticleTitle=Understand the trusted context feature in Informix