Security Architecture of IBM Db2 Data Management Console

Access to IBM® Db2® Data Management Console features, and the data that the console manages, is controlled through authentication and authorization.

IBM Db2 Data Management Console can be accessed using both the secure and unsecured HTTPS protocol.

Access to IBM Db2 Data Management Console is managed either by the console itself or by authenticating facilities that reside outside of the console, like an LDAP server or repository database. Access within IBM Db2 Data Management Console (authorization) is managed by assigning user roles and privileges. User privileges and operation/data collection credentials are used to ensure the security for target databases.

The diagram below provides a high-level view of IBM Db2 Data Management Console security.

Figure 1. IBM Db2 Data Management Console Security Architecture