473,555 Members | 2,333 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Authentication Question

Question
DB2 Enterprise Server Edition(ESE) is running on Linux and needs to
validate the userids and passwords on the z/OS server for the DB2
clients connecting to DB2 for z/OS. Which of the following
authentication levels satifies this while providing authentication for
other DB2 ESE server?
A.ACS
B.DRDA
C.HOST
D.CLIENT
E.SERVER

Answer: A

I dont understand this question completely. Who can give me some tips
why the answer is A. Acutally I don't know what is ACS.

Thanks so much!

James

Sep 20 '06 #1
3 1358
Sure that isn't "DCS"?

Larry Edelstein

Jimmy wrote:
Question
DB2 Enterprise Server Edition(ESE) is running on Linux and needs to
validate the userids and passwords on the z/OS server for the DB2
clients connecting to DB2 for z/OS. Which of the following
authentication levels satifies this while providing authentication for
other DB2 ESE server?
A.ACS
B.DRDA
C.HOST
D.CLIENT
E.SERVER

Answer: A

I dont understand this question completely. Who can give me some tips
why the answer is A. Acutally I don't know what is ACS.

Thanks so much!

James
Sep 20 '06 #2
I am not sure about it. It's just a copy and I donot know whether there
is any mistake.
Any idea?

Thanks

James

Larry wrote:
Sure that isn't "DCS"?

Larry Edelstein

Jimmy wrote:
Question
DB2 Enterprise Server Edition(ESE) is running on Linux and needs to
validate the userids and passwords on the z/OS server for the DB2
clients connecting to DB2 for z/OS. Which of the following
authentication levels satifies this while providing authentication for
other DB2 ESE server?
A.ACS
B.DRDA
C.HOST
D.CLIENT
E.SERVER

Answer: A

I dont understand this question completely. Who can give me some tips
why the answer is A. Acutally I don't know what is ACS.

Thanks so much!

James
Sep 21 '06 #3
If you are referring to V8, suggest you read here:

http://publib.boulder.ibm.com/infoce...n/r0000294.htm

Larry Edelstein

Jimmy wrote:
I am not sure about it. It's just a copy and I donot know whether there
is any mistake.
Any idea?

Thanks

James

Larry wrote:
>>Sure that isn't "DCS"?

Larry Edelstein

Jimmy wrote:
>>>Question
DB2 Enterprise Server Edition(ESE) is running on Linux and needs to
validate the userids and passwords on the z/OS server for the DB2
clients connecting to DB2 for z/OS. Which of the following
authenticati on levels satifies this while providing authentication for
other DB2 ESE server?
A.ACS
B.DRDA
C.HOST
D.CLIENT
E.SERVER

Answer: A

I dont understand this question completely. Who can give me some tips
why the answer is A. Acutally I don't know what is ACS.

Thanks so much!

James

Sep 21 '06 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

8
3683
by: Bob Everland | last post by:
I have an application that is ISAPI and the only way to secure it is through NT permissions. I need to have a way to login to windows authentication so that when I get to the ISAPI application no boxes come up. I want an ASP page to sit between the user and the ISAPI application. The rest of my application is using authentication that is...
6
4805
by: Billy Jacobs | last post by:
I have a website which has both secure and non-secure pages. I want to uses forms authentication. How do I accomplish this? Originally I had my web.config file in the root with Forms Authentication set up and it worked just fine. Then I realized that I needed to have some pages unsecure. I then created 2 directories. One named Secure and...
1
3486
by: Rob | last post by:
I have an ASP.NET application that uses forms-based authentication. A user wishes to be able to run multiple sessions of this application simultaneously from the user's client machine. The web.config file is configured as such: <authentication mode="Forms"> <forms loginUrl="Login.aspx" protection="All" name="myApplication"/>...
4
6792
by: Andrew | last post by:
Hey all, I would like to preface my question by stating I am still learning ASP.net and while I am confident in the basics and foundation, the more advanced stuff is still a challenge. Ok. :)
0
2064
by: William F. Zachmann | last post by:
A web site that will run on Windows Server 2003 and IIS 6.0 needs to provide three levels of access, one for the public and two others for two levels of subscribers. This is a port of a prior site that runs on an old version of the Netscape Web server (which manages user authentication and access). The three levels of access are currently...
18
6863
by: Rippo | last post by:
Hi I am using role base forms authentication in asp.net and have come across a problem that I would like advice on. On a successful login a session variable is set to identify a user. This is all good as this session variable is used to retrieve data for that user etc. However if I restart the webserver then the users session is lost but...
6
3317
by: Ming Zhang | last post by:
Hi guys, I have couple of ASP.NET applications that only support digest windows authentication, and credentials are managed in a central AD. When users login to one app, they can easily navigate to other apps without reenter UID/PWD. Everything works except it doesn't meet our security policy for new created users. When creating a new user,...
2
1944
by: jimcleve | last post by:
Have an authentication/authorizaiton question. Our usual means to provide SYSADM authority for incoming connections to DB2 v8.2 on AIX has been to use SERVER authentication and set the SYSADM_GROUP dbm cfg parameter accordingly. How can same be accomplished for incoming z/OS connections when authentication is set to CLIENT? That is, does the...
18
3395
by: troywalker | last post by:
I am new to LDAP and Directory Services, and I have a project that requires me to authenticate users against a Sun Java System Directory Server in order to access the application. I have found dozens of examples of how to authenticate users against Active Directory, but AD seems to be a different animal than Sun Java System Directory Server....
4
5318
by: Bjorn Sagbakken | last post by:
In a web-application with login creds (user, pwd), these are checked against a user table on a SQL server. On a positive validation I have saved the userID, name, custno and role-settings in a userobject (custom build class) and added this to the session using as session variable like session For all other pages I have added a small test in...
0
8060
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that...
0
7904
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
0
6176
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then...
1
5452
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes...
0
3596
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
0
3575
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
2037
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
1
1159
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
865
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.