If the trusted logon option is enabled for users connecting through a three tier application, but access through two-tier clients, such as the Windows® Client, is also required for the same set of users, it constitutes a security risk.
If the connect user ID (ICMCONCT) is configured to allow user to connect without giving a password and users are granted the "allow trusted logon" privilege and the connect user ID is used for both the two-tier and three-tier environment, users connecting through the two-tier client might be able to logon without a password. This security risk can be avoided by using a second connect user ID.
[{"Product":{"code":"SSRS7Z","label":"IBM Content Manager Enterprise Edition"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Component":"Logon Issues","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF025","label":"Platform Independent"},{"code":"PF033","label":"Windows"}],"Version":"8.1;8.2;8.3;8.4","Edition":"All Editions","Line of Business":{"code":"LOB76","label":"Data Platform"}},{"Product":{"code":"SSRS7Z","label":"IBM Content Manager Enterprise Edition"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Component":"SysAdmin\/Configuration Issues","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"","label":"UNIX"},{"code":"","label":"Windows 2000"},{"code":"","label":"Windows XP"},{"code":"","label":"Windows 2003"}],"Version":"8.1;8.2;8.3","Edition":"All Editions","Line of Business":{"code":"LOB76","label":"Data Platform"}},{"Product":{"code":"SSRS7Z","label":"IBM Content Manager Enterprise Edition"},"Business Unit":{"code":"BU048","label":"IBM Software"},"Component":"DB2 Information Integrator for Content","Platform":[{"code":"PF002","label":"AIX"},{"code":"","label":"Red Hat Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"8.1;8.2;8.3","Edition":"All Editions","Line of Business":{"code":"LOB76","label":"Data Platform"}}]
This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.