Although Net.Data does not provide any type of security measures directly, you can keep your assets secure with existing measures you probably already use to protect your system and data. You must decide what level of security is appropriate for your assets.
Net.Data supports two types of authentication: one protecting certain directories on your server and one protecting your database.
You can encrypt all data sent between a client system and your Web server when you use a Web server with Secured Sockets Layer (SSL) or Secured Hypertext Transfer Protocol (SHTTP). These security measures encrypt login IDs, passwords, and all data input through HTML forms from the client and all data sent from the Web server.
Net.Data can be used with IBM Firewall and most other firewall products, which protect both the Net.Data server and the network from external probes or attacks. Carefully consider these configurations with your organization's security policies:
In this configuration, a subnetwork is created that contains only Net.Data and the Web server. This is the most secure configuration, placing both Net.Data and DB2 inside the firewall. This configuration requires these security measures:
An alternative configuration is to place Net.Data outside the firewall on a workstation platform with DB2 inside the firewall, and using DDCS to communicate between them. This configuration is simpler than Configuration A, yet still offers database protection.
This configuration shows DB2 inside the firewall. The Web server must have CAE installed. Also, the firewall must have a packet filtering rule allowing DB2 client requests from Net.Data and ack packets from DB2 to Net.Data.
The firewall needs no packet filtering rules for this configuration, but Net.Data and DB2 are left unprotected from external attacks.
Yet another method to protect your assets is to create your own protection scheme using Net.Data. For example, you can request validation information from a user through and HTML form and validate it using data in a database or through an external program called from a Net.Data macro.
You also protect your assets by the SQL statements you allow people to send to the database. For example, limiting SELECT statements to two tables. For more information on protecting your assets, see the Internet security list of frequently asked questions (FAQ) at this Web site:
http://www-genome.wi.mit.edu/WWW/faqs/www-security-faq.html
For additional security, consider using hidden variables to conceal your database's internal structure from people who choose to view your HTML source with their Web browser. See "Hidden Variables" for more information.