Connection security protocols
Several connection security protocols are supported by the current Db2 for i implementation of distributed data management (DDM) or Distributed Relational Database Architecture (DRDA) over TCP/IP.
- User ID only
- User ID with clear-text password
- User ID with encrypted password
- Encrypted user ID with encrypted password.
- Kerberos
With encrypted datastream support, the traditional communications trace support has little value. The Trace TCP/IP Application (TRCTCPAPP) command records outbound data streams at a point before encryption, and inbound data streams after decryption.