Deploying a group retrieval plug-in
To customize the DB2 security
system's group retrieval behavior, you can develop your own group
retrieval plug-in or buy one from a third party.
Deploying a user ID/password plug-in
To customize the DB2 security
system's user ID/password authentication behavior, you can develop
your own user ID/password authentication plug-ins or buy one from
a third party.
Deploying a GSS-API plug-in
To customize the DB2 security
system's authentication behavior, you can develop your own authentication
plug-ins using the GSS-API, or buy one from a third party.
Deploying a Kerberos plug-in
To customize the DB2 security
system's Kerberos authentication behavior, you can develop your own
Kerberos authentication plug-ins or buy one from a third party. Note
that the Kerberos security plug-in will not support IPv6.