How To
Summary
In IBM® Engineering Lifecycle Management (ELM) environment in order to comply with security policy, you might need to establish a secure database connection with DB2 Database.
Document Location
Worldwide
[{"Type":"MASTER","Line of Business":{"code":"LOB77","label":"Automation Platform"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSF34G","label":"IBM Engineering Lifecycle Management Suite"},"ARM Category":[{"code":"a8m50000000L3DPAA0","label":"ELM"}],"ARM Case Number":"","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Versions"}]
Log InLog in to view more of this document
This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.
Was this topic helpful?
Document Information
More support for:
IBM Engineering Lifecycle Management Suite
Component:
ELM
Software version:
All Versions
Document number:
6983753
Modified date:
14 April 2023
UID
ibm16983753
Manage My Notification Subscriptions