IBM Books

DB2 Connect User's Guide


Security with DCE Directory Services

As DB2 Connect administrator, you can determine where user names and passwords are validated. With DCE directories, you do this by setting the following:

Table 13 and Table 14 show the possible combinations of these values and where validation is performed for each combination. Only the combinations shown in these tables are supported by DB2 Connect with DCE Directory Services.

Table 13. Valid Security Scenarios with DCE using APPC connections
  Database object of the Server Routing object Validation
Case Authentication Security Authentication at DB2 Connect Gateway (1=true, 0=false)
1 CLIENT SAME 0 Remote client (or DB2 Connect workstation)
2 CLIENT SAME 1 DB2 Connect workstation
3 SERVER PROGRAM 0 host or AS/400 database server
4 SERVER PROGRAM 1 DB2 Connect workstation and host or AS/400 database server
5 DCE NONE Not applicable At the DCE security server
Note:If a remote client is connected to the DB2 Connect Enterprise Edition gateway workstation via an APPC connection, specify a security type of NONE in the DCE locator object of the gateway.

Table 14. Valid Security Scenarios with DCE using TCP/IP connections
Case Database object of the Server Routing object Validation
  Authentication Authentication at DB2 Connect Enterprise Edition Gateway (1=true, 0=false)
1 CLIENT 0 Remote client (or DB2 Connect workstation)
2 CLIENT 1 DB2 Connect workstation
3 SERVER 0 host or AS/400 database server
4 Not applicable Not applicable None
5 DCE not applicable At the DCE security server

Each combination is described in more detail below:

Notes:

  1. For AIX systems, all users using security type SAME must belong to the AIX system group.

  2. For AIX systems with remote clients, the instance of the DB2 Connect product running on the DB2 Connect server must belong to the AIX system group.

  3. Access to a host or AS/400 database server is controlled by its own security mechanisms or subsystems; for example, the Virtual Telecommunications Access Method (VTAM) and Resource Access Control Facility (RACF). Access to protected database objects is controlled by the SQL GRANT and REVOKE statements.


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]

[ DB2 List of Books | Search the DB2 Books ]