473,800 Members | 2,647 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Password Security Policy in DB2

Dear Friends

In db2, is it possible to put password security policy.

Like password must contain with all mixed characters (alphabets,
special characters, numerics) and password should not be same with
login id.

Is it possible to set up in DB2 Databases on windows.
Appreciate your help

Cheers:)

Satish

Sep 26 '06 #1
2 5536
"V_S_H_Sati sh" <sa************ *@gmail.comwrot e in message
news:11******** **************@ m73g2000cwd.goo glegroups.com.. .
Dear Friends

In db2, is it possible to put password security policy.

Like password must contain with all mixed characters (alphabets,
special characters, numerics) and password should not be same with
login id.

Is it possible to set up in DB2 Databases on windows.

Appreciate your help

Cheers:)

Satish
DB2 uses the operating system to authenticate userids and passwords. So
whatever password rules that the operating system can enforce will be apply.

Yes, DB2 for Linux, UNIX, and Windows runs on Windows 2000, XP Pro, and 2003
Server.

You can download a free copy of DB2 Express-C if you server has less than
4GB of memory and 2 CPUs or less (dual core CPUs count as 1 CPU each). DB2
Express-C lacks some features of DB2 ESE, primarily relating to data
warehousing, but other than that it has all the functions that most people
would need.

This free version of DB2 can be used for any development, testing, or
production use, but support is limited to the DB2 Express-C forum and new
distributions may not be released every time a new DB2 fixpack is released
for regular licensed versions.

http://www-306.ibm.com/software/data.../download.html
Note that you can download V9.1 or 8.2.4.

Sep 26 '06 #2
Dear Mark A

Thank you very much for your support.

Cheers

satish

Mark A wrote:
"V_S_H_Sati sh" <sa************ *@gmail.comwrot e in message
news:11******** **************@ m73g2000cwd.goo glegroups.com.. .
Dear Friends

In db2, is it possible to put password security policy.

Like password must contain with all mixed characters (alphabets,
special characters, numerics) and password should not be same with
login id.

Is it possible to set up in DB2 Databases on windows.

Appreciate your help

Cheers:)

Satish

DB2 uses the operating system to authenticate userids and passwords. So
whatever password rules that the operating system can enforce will be apply.

Yes, DB2 for Linux, UNIX, and Windows runs on Windows 2000, XP Pro, and 2003
Server.

You can download a free copy of DB2 Express-C if you server has less than
4GB of memory and 2 CPUs or less (dual core CPUs count as 1 CPU each). DB2
Express-C lacks some features of DB2 ESE, primarily relating to data
warehousing, but other than that it has all the functions that most people
would need.

This free version of DB2 can be used for any development, testing, or
production use, but support is limited to the DB2 Express-C forum and new
distributions may not be released every time a new DB2 fixpack is released
for regular licensed versions.

http://www-306.ibm.com/software/data.../download.html
Note that you can download V9.1 or 8.2.4.
Sep 26 '06 #3

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
5430
by: Lorenzo | last post by:
hi you all, first of all apologies for having cross-posted this message but really i did not know where to post it. please let me know what ng you consider the most suitable for the described issue. i wrote a program made by a client and a server that communicate via RMI premise 1) everything has been developed and executed on WinXP Professional and the following jre
2
448
by: Joseph Braganza | last post by:
I have forgotten my administration password on XP. Is there any solution?
5
28328
by: Bryan Yeo | last post by:
Trying to get the user password expire date from AD, but there is no such field. What I could get is the PasswordLastChanged property. Is there anyway I could calculate the date or something? Regards, Bryan
0
2099
by: Namratha Shah \(Nasha\) | last post by:
Hey Guys, Today we are going to look at Code Access Security. Code access security is a feature of .NET that manages code depending on its trust level. If the CLS trusts the code enough to allow it ro run then it will execute, the code execution depends on the permission provided to the assembly. If the code is not trusted wnough to run or it attempts to perform an action which doe not have the required permissions then its execution...
3
21432
by: Ken Varn | last post by:
I notice that ASP.NET has a user that runs on its behalf (ASPNET user). I an concerned about site security and would like it if someone can explain the security of the ASPNET user. In particular, is the password managed automatically in the same way as the IIS password for the anonymous user account? If this is true, how is the password managed? Is it re-generated every-so-often or only once at installation? Also, I have read various...
1
3435
by: jake | last post by:
Hi. I am building web apps in visual web developer 2005 express and SQL 2005 express. Users have complained about the strong password policy, so I would like to change it to somthing like at least 5 letters and 1 number. Thanks for the help in advance. -Jake
2
2843
by: James | last post by:
We have our own set of users and passwords for our application and we want to implement strong passwords. My question is can you access the windows password policy settings in order to validate a password the user has typed in? Even if you cant use the password history for your own passwords, it would still be useful to use the other settings like minimum length etc... We could store our own format for the password maybe as a regular...
1
8012
by: Yasin Cepeci | last post by:
Password length minimum: 7. Non-alphanumeric characters required.I ve taken this error. Microsoft Security Policy requires something nonsense I think. I never think a password like "75256asdf!^+%&" this. How can I use normal passwords which users demand what their hearth say as a password.: 1.
2
5299
by: Bodanapu | last post by:
Hi, I want to enable " Password must meet the complexity requirements" property in Local Security Policy->Account Policies->Password Policy in Administartive tools programmatically or using any script but not manually. Please tell me a way to do this. This is very urgent requirement for me. Thanks and Regards, Padmaja
0
9694
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10509
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10281
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
9095
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7584
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6824
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5477
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5612
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4152
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.