Login mapping without trusted connections

This topic describes the procedures of setting up login mapping without trusted connections.

About this task

To set up login mapping for a data source without trusted context:

Procedure

  1. Right-click a data source in the Repositories view. Select Properties from the menu. The Properties window opens. Select Login Mapping from the tree. The Login Mapping page of the window opens.
    All users and groups that have been defined for the repository are listed in the Data source login list. This list is empty if you have not defined any users or groups.
  2. If you set up login mapping for a Db2 database, make sure the Use trusted connections check box is deselected.
  3. To set up mapping for a user or group, select a user or group and click the Edit data source login button above the list box.
    The Edit Data Source Login window opens.
  4. Specify the user ID that will be used to login to the database data source in the Login field.
  5. Specify the password that will be used to login to the database data source in the Password field.
  6. Verify the password by retyping it in the Verify password field.
  7. Specify the priority that will be placed on this login information in the Priority field. You can enter any numerical value in this field with the value of 1 having the lowest priority. The Priority value is used to determine what login mapping ID and password will be invoked for a user that is a member of multiple groups. To find more information about priority, see Setting up login mapping for a data source.
  8. Click OK. The data source login information for the selected user or group is listed in the Data source login list as follows:
    • Login mapping owner lists the name of the user or group that will use this login to access the data source. For more information about users and groups, see Managing users and user groups.
    • Auth ID specifies the login user ID that will be used to access the data source for the user or group.
    • Priority specifies the priority that is assigned to the login information. This priority value determines which login information will be invoked for users that are members of multiple groups.
    You will repeat this process for each user or group for which you want to set up login mapping information.
  9. To edit existing data source login information, select the data source login information from the Data source login list table and click the Edit data source login button located above the list box. The Edit Data Source Login window opens. You can make changes to any of the fields. Click OK to close the Edit data source login window.
  10. To delete existing data source login information, select the data source login from the Data source login list table and click the Remove data source login button located above the list box.
  11. Click OK. The login mapping parameters that you have specified for each user or group are in effect for the data source. You must set up login mapping information individually for each data source in the repository.