DB2 Connect User's Guide

Security Types

This section lists the various combinations of authentication and security settings that are supported with DB2 Connect over both APPC and TCP/IP connections.

The discussion which follows applies to both types of connection.

Security Types for APPC Connections

The following security types are allowed for APPC connections to specify what security information will flow at the communications layer:

SAME
Only the user name is passed to the host or AS/400 database server.

PROGRAM
The user name and password are passed to the host or AS/400 database server.

NONE
No security information flows.

Table 5 shows the possible combinations of these values and the authentication type specified on the DB2 Connect workstation, and where validation is performed for each combination. Only the combinations shown in this table are supported by DB2 Connect over APPC connections.

Table 5. Valid Security Scenarios for APPC connections
Case Authentication setting in the database directory entry at the DB2 Connect workstation Security Validation
1 CLIENT SAME Client
2 SERVER SAME DB2 Connect server
3 SERVER PROGRAM DB2 Connect server and host or AS/400 database server
4 SERVER_ENCRYPT or DCS_ENCRYPT NONE host or AS/400 database server
5 DCS PROGRAM host or AS/400 database server
6 DCE NONE DCE security server

If remote clients are connected to a DB2 Connect Enterprise Edition server, specify the following authentication and security types:

Notes:

  1. For AIX systems, all login users using APPC security type SAME must belong to the AIX system group.

  2. For AIX systems with remote clients, the instance of the DB2 Connect product running on the DB2 Connect workstation must belong to the AIX system group.

  3. Access to a host or AS/400 database server is controlled by its own security mechanisms or subsystems; for example, the Virtual Telecommunications Access Method (VTAM) and Resource Access Control Facility (RACF). Access to protected database objects is controlled by the SQL GRANT and REVOKE statements.

Security Types for TCP/IP Connections

The TCP/IP communication protocol does not support security options at the network protocol layer. Thus only the authentication type controls where authentication takes place. Only the combinations shown in this table are supported by DB2 Connect over TCP/IP connections.

Table 6. Valid Security Scenarios for TCP/IP connections
Case Authentication setting in the database directory entry at the DB2 Connect workstation Validation
1 CLIENT Client
2 SERVER or SERVER_ENCRYPT DB2 Connect workstation
3 Not applicable None
4 DCS or DCS_ENCRYPT host or AS/400 database server
5 DCE DCE security server

Discussion of Security Types

The following discussion applies to both APPC and TCP/IP connections, as described above and listed in Table 5 and Table 6. Each case is described in more detail, as follows:


[ Top of Page | Previous Page | Next Page ]