Authenticating users through Kerberos
If your distributed environment uses Kerberos to manage users and perform user authentication, Db2 for z/OS® can use Kerberos security services to authenticate remote users.
If your distributed environment uses Kerberos to manage users and perform user authentication, Db2 for z/OS® can use Kerberos security services to authenticate remote users.