Filter by products, topics, and types of content

(110 Products)

(142 Topics)

(12 Industries)

(14 Types)

1 - 54 of 54 results
Show Summaries | Hide Summaries
View Results
Title none Type none Date none
DB2 security, Part 4: Understand how authorities and privileges are implemented in DB2 UDB
A series of articles about IBM DB2 Universal Database for Linux, UNIX, and Windows (DB2 UDB) V8.2 security features would not be complete without a discussion of the different administrative authority levels and privileges. This article is the fourth part of a series that examines the security features available in DB2 UDB V8.2. It reviews the different administrative authority levels and privileges available in DB2 UDB and how they can be granted to and revoked from user and group accounts.
Also available in: Chinese  
Articles 20 Sep 2012
DB2 security, Part 7: Object ownership management for DB2 9
Learn about a new IBM DB2 9 feature that lets you transfer ownership, and an orphan ID concept to help you to cope with the object ownership management nightmare.
Articles 24 Aug 2006
DB2 security, Part 10: Deploy customized security plug-ins in DB2 9
Determine what should be tested before deploying your own customized security plug-ins. Accompanying this article, there is a security plug-in loader program. This article also discusses how to take advantage of the new enhancements to the security plug-in infrastructure in DB2 9.
Articles 19 Oct 2006
Understanding IBM InfoSphere MDM Server security, Part 3: Using LDAP to implement transaction authorization
IBM InfoSphere Master Data Management Server allows you to plug in your transaction authorization provider. In this article, learn about the default transaction authorization provider and explore an example showing how to implement a transaction authorization provider using an LDAP server.
Also available in: Chinese  
Articles 20 Nov 2008
DB2 Security, Part 11: Develop a security plug-in for DB2 database authentication
Learn about the design and development of a DB2 security plug-in that retrieves user ID, group, and group membership information from a local or remote DB2 database. Accompanying the article is a working implementation of the security plug-in ported to Windows, Linux, and AIX operating systems.
Also available in: Chinese  
Articles 25 Nov 2009
DB2 security, Part 3: Security plug-ins using the GSS-API security mechanisms (SPKM / LIPKEY)
Use the new GSS-API security mechanisms to customize the DB2 UDB security plug-ins to achieve authentication based on public key technology.
Articles 08 Dec 2005
DB2 security, Part 6: Configure Kerberos for authentication on DB2 UDB for Linux, UNIX, and Windows
Using Kerberos for authentication provides a central repository for user IDs (or principals), thus centralizing and simplifying principal or identity management. Learn how to set up a single Kerberos realm environment for DB2 for Linux, UNIX, and Windows (DB2 UDB) and configure DB2 to use Kerberos authentication.
Articles 16 Mar 2006
DB2 security, Part 2: Understand the DB2 for Linux, UNIX, and Windows security plug-ins
Learn about the IBM DB2 for Linux, UNIX, and Windows (DB2) security plug-ins, a new feature introduced in Version 8.2. This article explains what the security plug-ins accomplish and teaches you how to enable and write your own security plug-ins.
Articles 18 May 2011
DB2 security, Part 8: Twelve DB2 security best practices
With the escalating number of publicized system security breaches, administrators must constantly be on the lookout for security holes in their systems so that their company does not become the next public embarrassment. Security is a large topic, and can be applied at various levels in a system architecture. This article focuses on twelve security best practices that database administrators (DBAs) and developers can follow to ensure the highest level of security in DB2 for Linux, UNIX, and Windows. These practices should complement other proactive security measures being applied at the other system levels.
Articles 20 Jul 2006
DB2 security, Part 5: Understand the DB2 audit facility
One of the lesser known but powerful components of DB2 UDB is the audit facility. The audit facility is an invaluable resource for security-conscious DBAs that need to monitor database events such as failed access attempts, database object modifications, and user validation with minimal effort. Learn about the DB2 audit facility, its purpose, how to use and configure it with the db2audit command, and get tips for using it effectively.
Also available in: Russian  
Articles 09 Mar 2006
DB2 security, Part 1: Understand how user and group accounts interact with DB2 UDB
Learn about the different user and group accounts that are needed to install and work with DB2 UDB for Linux, UNIX, and Windows, Version 8.2. This article also introduces the DB2 UDB security model, including user authentication, user and group authorization, and super users.
Articles 25 Aug 2005
Connect your apps to DB2 with high-security Kerberos
This tutorial is a primer to help programmers using IBM Data Server Drivers get applications quickly running in a Kerberos environment. We will be setting up a simple Kerberos environment on Windows, configuring DB2 to use Kerberos authentication, and enabling the client drivers to securely authenticate using Kerberos.
Also available in: Chinese  
Tutorial 02 Mar 2015
Designing and deploying a security model using IBM InfoSphere Warehouse Cubing Services
In IBM InfoSphere(TM) Warehouse V9.7, Cubing Services modify the way you secure your cubes and provide a way for you to secure your dimensions. You might need to limit access to your OLAP data at the level of the cube or at the more granular level of the dimension, depending on your security requirements. In this article, you will learn how to define security on cubes and dimensions by creating roles, policies, and authorizations in the Design Studio. This article describes how to export the security model to a file and how to use the Administration Console to import the security model to the InfoSphere Warehouse control database. After importing the security model, you will learn how to instruct the Cube Server to enforce the rules in the security model.
Articles 03 Sep 2009
Multilevel Security and DB2 Row-Level Security Revealed
Review the steps necessary to implement MLS in a z/OS environment, followed by a look at MLS as applied to TCP/IP and look at the two options that DB2 V8 offers to protect its resources without multilevel security.
Redbooks 29 Apr 2005
DB2 Security and Compliance Solutions for Linux, UNIX, and Windows
This IBM Redbooks publication discusses the existing and new DB2 security features introduced in DB2 9.5 for Linux, UNIX, and Windows. These enriched DB2 security features provide you with the capability to protect your data and comply with regulatory requirements.
Redbooks 01 Jul 2008
Security Functions of IBM DB2 10 for z/OS
This IBM Redbooks publication provides a detailed description of DB2 10 security functions from the implementation and usage point of view. It is intended to be used by database, audit, and security administrators.
Redbooks 17 Nov 2011
DB2 10.1 DBA for Linux, UNIX, and Windows certification exam 611 prep, Part 7: Security
This tutorial introduces the concepts of authentication, authorities, privileges, audit facility, trusted context, RCAC, and LBAC as they relate to DB2 10. It is the seventh in a series of tutorials designed to help you prepare for the DB2 10.1 for Linux, UNIX, and Windows Database Administration (exam 611). You should have basic knowledge of database concepts and operating system security.
Tutorial 06 Dec 2012
DB2 10.1 fundamentals certification exam 610 prep, Part 2: DB2 security
This tutorial introduces authentication, authorization, privileges, and roles as they relate to IBM DB2 10.1. It also introduces granular access control and trusted contexts. This is the second in a series of six tutorials designed to help you prepare for the DB2 10.1 Fundamentals certification exam (610). It is assumed that you already have basic knowledge of database concepts and operating system security.
Also available in: Chinese   Portuguese  
Articles 05 Jun 2014
DB2 9 Fundamentals exam 730 prep, Part 2: Security
This tutorial introduces the concepts of authentication, authorization and privileges as they relate to DB2(R) 9. It is the second in a series of seven tutorials designed to help you prepare for the DB2 9 Fundamentals Certification Exam (730). You should have basic knowledge of database concepts and operating system security. This is the second in a series of seven tutorials to help you prepare for the DB2 9 for Linux(R), UNIX(R), and Windows(R) Fundamentals exam 730.
Also available in: Spanish   Spanish  
Tutorial 20 Jul 2006
Gain confidence about data security in the cloud
This tutorial demystifies cloud security and arms you with the know-how to adopt the cloud with confidence. Learn how cloud security is a shared responsibility between the cloud service provider and the client. The responsibilities of each party are explored. Also walk through a data security use case involving dashDB. When certain criteria are met, clients can achieve data security equal to or better than what they can achieve onsite.
Also available in: Chinese   Russian   Spanish  
Articles 07 Aug 2014
Security information management challenges and solutions
Learn to identify the specific challenges in your own environment, and get on the right track with the task of designing and administering a strong security solution using either DB2 or Informix Dynamic Server. In addition, a handy chart lays out the problems and the solutions, and lists how the solutions are implemented in both Informix and DB2.
Also available in: Chinese  
Articles 13 Jul 2006
Tune IBM DB2 for optimum IBM Tivoli Security Operations Manager performance
IBM Tivoli Security Operations Manager gathers massive amounts of information that is stored in a relational database such as DB2. Learn how tuning DB2 for Linux, UNIX, and Windows helps you get the best performance from your IBM Tivoli Security Operations Manager installation.
Also available in: Chinese  
Articles 11 Nov 2010
Enhance Informix Dynamic Server security using the Pluggable Authentication Module framework and JDBC
The Pluggable Authentication Module framework makes it possible to implement a highly flexible authentication architecture with Informix Dynamic Server (IDS). Learn how to implement this mechanism using a sample IDS JDBC application.
Articles 19 Apr 2007
Encrypting Data Values in DB2 Universal Database
Data privacy and security continue to be hot buttons for consumers. That's increasingly true with the growing number of Web-based applications that gather critical information for an increasing number of users. This article describes how to use new functions available in IBM DB2 UDB Version 7.2 to easily integrate data encryption into database applications.
Also available in: Japanese  
Articles 14 Aug 2001
Secure DB2 resources using Tivoli Access Manager for Operating Systems
Learn how to secure your IBM DB2 resources using Tivol Access Manager for Operating Systems (TAMOS). TAMOS is an IBM solution for securing resources on UNIX and Linux operating systems. This article steps you through two real-world scenarios to show you how to use TAMOS to set policies that protect DB2 resources. You can use these scenarios as a foundation for building an enterprise-wide security solution for your database.
Also available in: Portuguese  
Articles 22 Apr 2010
Considering SQLJ for Your DB2 V8 Java Applications
Learn why SQLJ is the language of choice for developers interested in security, performance, and simplicity. Code samples are included.
Also available in: Japanese  
Articles 13 Feb 2003
Use Technology Explorer for IBM DB2 to manage user and group authentication for DB2 for Linux, UNIX, and Windows
Learn how to use the Technology Explorer (TE) for IBM DB2(R) to control user and group authentication to DB2 through the use of a security plug-in called db2auth. The plug-in uses a DB2 database for storing authentication information instead of an external authentication repository, such as an operating system or Kerberos. The plug-in allows for a smoother migration from other database software such as MySQL, which also stores authentication information within the database. This article also describes how the support in TE for the db2auth plug-in was implemented. [2009 Nov 13: Updated to show Linux support. --Ed.]
Also available in: Portuguese  
Articles 13 Nov 2009
DB2 UDB and SOAP: Database Web Services Follow-up with DataSnap
This article shows how to add authentication to DataSnap applications using a special Login method; points out that the importance of combining this with SSL certificates for increased security; and describes how to deploy the DataSnap server application on a Web server machine.
Articles 08 May 2003
Using the IBM InfoSphere Warehouse 9.7 Administration Console, Part 1: Getting started and setting up
This series of articles introduces the IBM InfoSphere(R) Warehouse Administration Console 9.7, which is part of the IBM InfoSphere Warehouse product. The InfoSphere Warehouse Administration Console provides an integrated Web portal to administer, monitor, and configure related InfoSphere Warehouse components in an operational environment. This Part 1 of this series provides a general introduction to the new features delivered in version 9.7, and it covers topics related to configuration and resource management, including security configuration, system metadata configuration, configuration services management, logging services management, connection management, and system resource management.
Also available in: Russian  
Articles 21 Sep 2009
What's new with DB2 Express-C 9.7.4
IBM DB2 Express-C has recently been enhanced with several important features and improvements that were previously available with only fee-based versions of DB2 for Linux, UNIX, and Windows. Learn how you can take advantage of new capabilities related to performance, application development, storage, security, and more.
Also available in: Chinese   Russian   Spanish  
Articles 05 May 2011
DB2 9 for z/OS: Packages Revisited
We begin with an overview of packages and explain the advantages of using packages. Because database request module (DBRM) based plans have been deprecated in DB2 9, you need to convert to packages if you did not use packages already. We provide guidance on using a DB2 provided function to convert from DBRM-based plans to packages. We re-examine the application development frameworks for packages: program preparation, package setup, and execution. For distributed applications, we include a discussion of a utility to identify and remove deprecated private protocol and converting to DRDA® as well as an introduction to the new pureQuery function of Data Studio. We also discuss common problems and their resolutions. We then explore administration and operational activities dealing with packages, including security, access path management (where we discuss the newly introduced package stability feature to allow for a seamless fallback), and management and performance aspects. The appendixes include useful queries and mention tools for managing packages effectively.
Redbooks 09 Mar 2009
Use trusted context in DB2 client applications
Learn how to implement trusted context on DB2 in a CLI, XA, or JDBC-based application. Using a trusted context in an application can improve security by placing accountability at the middle-tier, reducing over granting of privileges, and auditing of end-user's activities.
Also available in: Russian  
Articles 28 Sep 2006
Restricting database connections using trusted contexts in DB2 for Linux, UNIX, and Windows
Security administrators are responsible for, among other things, protecting a database against unauthorized access or misuse by authorized database users (for example, inappropriate access to sensitive information within a database). A common requirement to mitigate such risks is ensuring that users are allowed to connect to the database only from a list of trusted hosts -- which are known to be secure. This article gives a practical example of how such a requirement can be put in practice by making use of the trusted context feature of DB2 for Linux, UNIX, and Windows.
Also available in: Chinese  
Articles 09 Feb 2012
Validate your DB2 installation using db2val
You can use the db2val copy validation tool for IBM DB2 for Linux, UNIX, and Windows to validate installed files at the database level, the instance level, or the system level. This function is useful not only for large-scale deployments of DB2, but also for embedding the DB2 installation process inside your own application installation. This article explains how to implement the tool and illustrates its use with several scenarios.
Also available in: Chinese  
Articles 21 Jul 2011
Implement DB2 for Linux, UNIX, and Windows trusted contexts and roles in a Web application
Explore how a Web application makes use of trusted contexts, roles, and new auditing capabilities in DB2 9.5 for Linux, UNIX, and Windows. Get the "before-and-after" story of how these feature were implemented at S1 Corporation.
Articles 20 Mar 2008
An Introduction to DB2 UDB Express GUI tools (Part 2 of 2)
Raul Chong continues his explanation of the GUI tools that come with DB2 UDB Express. In Part 2, he covers automating your database tasks and basic performance tuning with the GUI tools, as well as troubleshooting problems with the GUI tools themselves.
Articles 31 Jul 2003
DB2 10 for z/OS Performance Topics
This IBM Redbooks publication provides an overview of the performance impact of DB2 10 for z/OS discussing the overall performance and possible impacts when moving from version to version. We include performance measurements that were made in the laboratory and provide some estimates.
Redbooks 27 Jun 2011
Managing IBM DB2 10 for z/OS Using the IBM DB2 Administration Tool for z/OS Version 10
The IBM DB2 Administration Tool for z/OS Version 10 helps you become productive from Day 1 with DB2 10 for z/OS by using performance savings right away, lowering the CPU costs while reducing the batch window. Users experience higher data availability by easily managing online schema changes, including additional columns to indexes to use index-only access. Customers are able to experience higher data availability through simplified recovery operations: -Access new functionality in DB2 10 for z/OS to lower costs and improve efficiency both before, during, and after the DB2 migration process. -Maximize the performance of your key DB2 business applications to speed their deployment in DB2 10 for z/OS. -Improve the productivity and efficiency of your staff when DB2 10 for z/OS is running. This IBM Redbooks publication highlights the data administration enhancements introduced by DB2 Administration Tool for z/OS Version 10 by providing scenarios of their use with the new functions provided by DB2 10 for z/OS.
Redbooks 25 Apr 2011
Set up Secure Sockets Layer (SSL) for DB2 on Windows
Using Secure Sockets Layer (SSL) with DB2 means your data can be sent securely over the network. In this technical tip, learn how to set up this protocol for DB2 on the Windows platform.
Tips 12 Jun 2008
DB2 10 for z/OS Technical Overview
This IBM Redbooks publication introduces the enhancements made available with DB2 10 for z/OS. The contents help you understand the new functions and performance enhancements, start planning for exploiting the key new capabilities, and justify the investment in installing or migrating or skip migrating to DB2 10.
Redbooks 03 Jan 2011
Perform LOB inlining in an HADR environment for a standby database
HADR standby databases are typically used as dedicated reporting databases for reducing load in a primary database. However, databases holding large-object (LOB) data have issues in replication, such as LOB data not getting replicated in a HADR standby database. LOB inlining can resolve the problem to some extent. LOB data of less than 32 KB will get replicated to a standby database and can then be fetched, but LOB data of more than 32 KB cannot be replicated in a standby database, so reports searching for LOB data with the larger size will fail in the standby database. Issues like query cost become higher for those queries accessing non-LOB column data of the same table, holding the LOB column, where inlining is performed. A higher query cost may slow down the system and should be analyzed for additional index creation. This tutorial will explain the steps for inlining, checking the errors found before and after inlining, and the resolution of the high query cost issue.
Articles 27 Aug 2015
DB2 9 for z/OS: Deploying SOA Solutions
In this IBM Redbooks publication, we help you to get started with SOA by showing the implementation of the minimum requirements: Creating Web services that allow access to data that is stored in data servers or applications and the realization of interaction services for business to consumer integration. We implement these requirements using functions that DB2 for z/OS provides, such as pureXML and SOAP UDFs, in conjunction with the functions that Data Studio, DataPower, and WebSphere Application Server provide.
Redbooks 02 Feb 2009
DB2 9 for z/OS: Distributed Functions
In this IBM Redbooks publication we describe how to set up your DDF environment, and how to deploy the DDF capabilities in different configurations, including how to develop applications that access distributed databases. We also describe a set of more advanced features, such as thread pooling and high availability distributed configurations, in a DB2 data sharing environment, as well as the traces available to you to do performance monitoring and problem determination. In summary, we show how a high-volume, highly available transactional application can be successfully implemented with a DB2 for z/OS data server accessed by all types of application servers or clients running on the same or different platform.
Redbooks 03 Aug 2009
IBM Smart Analytics Cloud
This IBM Redbooks publication presents a Smart Analytics Cloud. The IBM Smart Analytics Cloud is an IBM offering to enable delivery of business intelligence and analytics at the customer location in a private cloud deployment. The offering leverages a combination of IBM hardware, software and services to offer customers a complete solution that is enabled at their site. In this publication, we provide the background and product information for decision-makers to proceed with a cloud solution.
Redbooks 04 Oct 2010
Managing pureQuery-enabled applications efficiently, Part 1: Set up an SQL management repository using an Ant script
IBM Optim Development Studio and the pureQuery Runtime include a command-line utility called ManageRepository that can be used to create, modify, export, import, and delete pureQuery metadata that is stored in the SQL management repository. Setting up an SQL management repository can be challenging using the ManageRepository utility command script. This tutorial shows you how to create and manage an SQL repository using an Ant script. You will also learn how to run the Ant script from within IBM Optim Development Studio.
Also available in: Portuguese  
Tutorial 27 Jan 2011
Using IBM InfoSphere Guardium Encryption Expert to protect your sensitive data
IBM InfoSphere Guardium Encryption Expert provides features to encrypt and control access to data written to file systems and database backup images. Beginning with Version 1.1 Fix Pack 3, the product supports both DB2 and Informix Dynamic Server (IDS). This article describes some of the key features and mechanisms of InfoSphere Guardium Encryption Expert and shows you how to use them.
Articles 02 Jul 2009
Leverage your Oracle 11g skills to learn DB2 9.7 for Linux, UNIX, and Windows
If you're a database specialist interested in growing your DB2 9 skills, there's a good chance that you've already developed database skills with another relational database product somewhere along the way. Recently updated for the latest versions of DB2 and Oracle, this article shows you how to use your current knowledge of Oracle 11g to quickly gain skills in DB2 9.7 for Linux, UNIX, and Windows.
Also available in: Chinese   Chinese   Russian   Spanish  
Articles 24 Mar 2011
Introduction to the New Mainframe: z/OS Basics
This IBM Redbook provides students of information systems technology with the background knowledge and skills necessary to begin using the basic facilities of a mainframe computer. It is the first in a planned series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing.
Redbooks 10 Apr 2008
DB2 10: What's new in DB2 10 for Linux, UNIX, and Windows
This article outlines the key features and enhancements in IBM DB2 10 for Linux, UNIX, and Windows. To be released in June, this latest version delivers new functionality that directly addresses your business needs in the areas of cost reduction, application performance, productivity, and reliability.
Also available in: Chinese   Russian  
Articles 03 Apr 2012
Technical tip: Secure DB2 communications using OpenSSH tunneling
Follow the steps outlined in this article to use SSH for secure communication between IBM DB2 clients and servers.
Articles 26 Apr 2007
PostgreSQL to DB2 porting guide
This technical guide describes the process of enabling a PostgreSQL database application to operate under IBM DB2 9.7 for Linux, UNIX, and Windows. It addresses the differences between PostgreSQL and DB2, both in functionality and syntax, and provides the details needed to visualize the scope of effort and to address technical issues.
Articles 04 Feb 2010
I encrypted my database! How do I manage my master keys now?
After your database is encrypted with DB2 native encryption, learn to manage your master keys to ensure that they are secured and protected. DB2 native encryption is available through the DB2 Encryption Offering as of DB2 10.5 Fix Pack 5. It supports master key management based on the public-key cryptography standard 12 (PKCS#12). This tutorial provides an easy-to-follow step-by-step guide to manage a GSKit PKCS#12-compliant keystore.
Also available in: Russian  
Articles 02 Apr 2015
Optimizing DB2 Queries with IBM DB2 Analytics Accelerator for z/OS
In this book we define a business analytics scenario, evaluate the potential benefits of the DB2 Analytics Accelerator appliance, describe the installation and integration steps with the DB2 environment, evaluate performance, and show the advantages to existing business intelligence processes.
Redbooks 20 Aug 2012
Encryption enhancements: Field procedure support in DB2 for i 7.1
Column-level encryption support is one of the major headline DB2 features in the IBM i 7.1 release. The DB2 for i 7.1 support enables transparent column-level encryption implementations with a field-level exit routine known as a field procedure. Discover how this exciting support allows developers to more easily and flexibly build a secure application.
Articles 06 Jan 2011
1 - 54 of 54 results
Show Summaries | Hide Summaries