Authentication protects the identity of the user so that user credentials cannot be intercepted by malicious hackers when transmitted over the network. See “Authentication” for an overview.Verify that your environment meets the requirements listed in Table 5-8 before you configure the DB2 data provider for Kerberos authentication.