Connection security protocols

Several connection security protocols are supported by the current Db2 for i implementation of distributed data management (DDM) or Distributed Relational Database Architecture (DRDA) over TCP/IP.

  • User ID only
  • User ID with clear-text password
  • User ID with encrypted password
  • Encrypted user ID with encrypted password.
  • Kerberos

With encrypted datastream support, the traditional communications trace support has little value. The Trace TCP/IP Application (TRCTCPAPP) command records outbound data streams at a point before encryption, and inbound data streams after decryption.