DB2 Version 9.7 for Linux, UNIX, and Windows

Deploying a Kerberos plug-in

To customize the DB2® security system's Kerberos authentication behavior, you can develop your own Kerberos authentication plug-ins or buy one from a third party. Note that the Kerberos security plug-in will not support IPv6.

Before you begin

Note: You must stop the DB2 server or any applications using the plug-ins before you deploy a new version of an existing plug-in. Undefined behavior including traps will occur if a process is still using a plug-in when a new version (with the same name) is copied over it. This restriction is not in effect when you deploy a plugin for the first time or when the plug-in is not in use.
After you acquire Kerberos authentication plug-ins that are suitable for your database management system, you can deploy them.

Procedure

Results

Note: For platforms supporting Kerberos, the IBMkrb5 library will be present in the client plug-in directory. The DB2 database manager recognizes this library as a valid GSS-API plug-in, because Kerberos plug-ins are implemented using GSS-API plug-in.