Filter by products, topics, and types of content

(110 Products)

(142 Topics)

(12 Industries)

(14 Types)

1 - 11 of 11 results
Show Summaries | Hide Summaries
View Results
Title none Type none Date none
DB2 security, Part 4: Understand how authorities and privileges are implemented in DB2 UDB
A series of articles about IBM DB2 Universal Database for Linux, UNIX, and Windows (DB2 UDB) V8.2 security features would not be complete without a discussion of the different administrative authority levels and privileges. This article is the fourth part of a series that examines the security features available in DB2 UDB V8.2. It reviews the different administrative authority levels and privileges available in DB2 UDB and how they can be granted to and revoked from user and group accounts.
Also available in: Chinese  
Articles 20 Sep 2012
DB2 9 Fundamentals exam 730 prep, Part 2: Security
This tutorial introduces the concepts of authentication, authorization and privileges as they relate to DB2(R) 9. It is the second in a series of seven tutorials designed to help you prepare for the DB2 9 Fundamentals Certification Exam (730). You should have basic knowledge of database concepts and operating system security. This is the second in a series of seven tutorials to help you prepare for the DB2 9 for Linux(R), UNIX(R), and Windows(R) Fundamentals exam 730.
Also available in: Spanish   Spanish  
Tutorial 20 Jul 2006
DB2 security, Part 1: Understand how user and group accounts interact with DB2 UDB
Learn about the different user and group accounts that are needed to install and work with DB2 UDB for Linux, UNIX, and Windows, Version 8.2. This article also introduces the DB2 UDB security model, including user authentication, user and group authorization, and super users.
Articles 25 Aug 2005
DB2 security, Part 7: Object ownership management for DB2 9
Learn about a new IBM DB2 9 feature that lets you transfer ownership, and an orphan ID concept to help you to cope with the object ownership management nightmare.
Articles 24 Aug 2006
DB2 security, Part 10: Deploy customized security plug-ins in DB2 9
Determine what should be tested before deploying your own customized security plug-ins. Accompanying this article, there is a security plug-in loader program. This article also discusses how to take advantage of the new enhancements to the security plug-in infrastructure in DB2 9.
Articles 19 Oct 2006
DB2 Security, Part 11: Develop a security plug-in for DB2 database authentication
Learn about the design and development of a DB2 security plug-in that retrieves user ID, group, and group membership information from a local or remote DB2 database. Accompanying the article is a working implementation of the security plug-in ported to Windows, Linux, and AIX operating systems.
Also available in: Chinese  
Articles 25 Nov 2009
DB2 security, Part 3: Security plug-ins using the GSS-API security mechanisms (SPKM / LIPKEY)
Use the new GSS-API security mechanisms to customize the DB2 UDB security plug-ins to achieve authentication based on public key technology.
Articles 08 Dec 2005
DB2 security, Part 6: Configure Kerberos for authentication on DB2 UDB for Linux, UNIX, and Windows
Using Kerberos for authentication provides a central repository for user IDs (or principals), thus centralizing and simplifying principal or identity management. Learn how to set up a single Kerberos realm environment for DB2 for Linux, UNIX, and Windows (DB2 UDB) and configure DB2 to use Kerberos authentication.
Articles 16 Mar 2006
DB2 security, Part 2: Understand the DB2 for Linux, UNIX, and Windows security plug-ins
Learn about the IBM DB2 for Linux, UNIX, and Windows (DB2) security plug-ins, a new feature introduced in Version 8.2. This article explains what the security plug-ins accomplish and teaches you how to enable and write your own security plug-ins.
Articles 18 May 2011
DB2 security, Part 8: Twelve DB2 security best practices
With the escalating number of publicized system security breaches, administrators must constantly be on the lookout for security holes in their systems so that their company does not become the next public embarrassment. Security is a large topic, and can be applied at various levels in a system architecture. This article focuses on twelve security best practices that database administrators (DBAs) and developers can follow to ensure the highest level of security in DB2 for Linux, UNIX, and Windows. These practices should complement other proactive security measures being applied at the other system levels.
Articles 20 Jul 2006
DB2 security, Part 5: Understand the DB2 audit facility
One of the lesser known but powerful components of DB2 UDB is the audit facility. The audit facility is an invaluable resource for security-conscious DBAs that need to monitor database events such as failed access attempts, database object modifications, and user validation with minimal effort. Learn about the DB2 audit facility, its purpose, how to use and configure it with the db2audit command, and get tips for using it effectively.
Also available in: Russian  
Articles 09 Mar 2006
1 - 11 of 11 results
Show Summaries | Hide Summaries