473,398 Members | 2,188 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,398 software developers and data experts.

Strange authentication, when account is disabled

Hello.

windows environment.

When I disable a user account, a see next:

1. w2k, fp4; db2 v7.2, FP10a: I can connect to database with this userid and
ANY password!!!
2. w2003; db2 v8.1.4: I can connect to database with this userid and its
password!

Is this a feature (if so, this is a very strange feature I think) or a bug?

Best regards,
Barinstein Mark.
Nov 12 '05 #1
4 1863
Hi Mark,

Could you send us a trace of both situations?

--
Garfield A. Lewis
DB2 UDB Development,
IBM Canada Laboratory
"Mark Barinstein" <ma**@crk.vsi.ru> wrote in message
news:bq**********@serv.vrn.ru...
Hello.

windows environment.

When I disable a user account, a see next:

1. w2k, fp4; db2 v7.2, FP10a: I can connect to database with this userid and ANY password!!!
2. w2003; db2 v8.1.4: I can connect to database with this userid and its
password!

Is this a feature (if so, this is a very strange feature I think) or a bug?
Best regards,
Barinstein Mark.

Nov 12 '05 #2
Hi.

I don't sure I understood this question.
What does it mean "trace"? Should I send db2audit output?
Could you send us a trace of both situations?

Nov 12 '05 #3
He wants db2trc output. Turn the trace on, replicate the problem, dump
the trace to a file, and turn db2trc off.

Mark Barinstein wrote:
Hi.

I don't sure I understood this question.
What does it mean "trace"? Should I send db2audit output?

Could you send us a trace of both situations?



Nov 12 '05 #4
If you are still unclear, this is what I want you to do:

db2start
db2trc on
db2 connect to <db> user <user> using <pw>
db2trc dmp trc.dmp
db2trc off
db2trc flw trc.dmp trc.flw
db2trc fmt trc.dmp trc.fmt

also run db2level and send it's output.

send me the db2level output, trc.flw and trc.fmt

However, before doing all that let's be clear about one thing. Is this all
being done from the same machine? Because if you have a client machine and a
server machine and you disable the userid on the server but you are doing
client authentication then the authentication will be done on the client
side and the server will not re-authenticate. In that case you need to
disable the user on the client machine.

--
Garfield A. Lewis
DB2 UDB Development,
IBM Canada Laboratory
"Blair Adamache" <ba*******@2muchspam.yahoo.com> wrote in message
news:bq**********@hanover.torolab.ibm.com...
He wants db2trc output. Turn the trace on, replicate the problem, dump
the trace to a file, and turn db2trc off.

Mark Barinstein wrote:
Hi.

I don't sure I understood this question.
What does it mean "trace"? Should I send db2audit output?

Could you send us a trace of both situations?


Nov 12 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Srinivas | last post by:
Hi, I've one system in which Active directory is installed. That system is the domain controller as well as web server - A test machine. Trying all following to Authenticate Users using VB as...
1
by: Maziar Aflatoun | last post by:
Hi guys, I'm using Windows authentication to connect to SQL Server 2000. On my computer the connection is fine. Now if I move it to a remote server, how to I hard code my Username/Password in...
9
by: Tom B | last post by:
In my web.config file I've specified Windows for the authentication, in IIS I've set it to Integrated Authentication. But my SQL connection is still showing Anonymous. Is there somewhere else I...
8
by: Nils Magnus Englund | last post by:
Hello, I am having trouble using Integrated Windows Authentication between our intranet server and our database server, both of which are on our local domain. Windows authentication works for...
3
by: na | last post by:
I am using form authentication and InProc cookieless session. The strange thing is that when an authenticated user try to navigate to any page that is in subfolder of the application root, the...
0
by: Shimon | last post by:
Hello, I have encountered strange problem regarding authentication and clustering. This is the scenario: We have an intranet web site with anonymous access, security using forms Auth and...
3
by: thomson | last post by:
Hi All, If i log into my windows machine, Iam already authenticated against the AD, Inorder to identify the Groups, Do i need to check the Active Directory once again, or Windows...
1
by: =?Utf-8?B?bWZt?= | last post by:
I'm not sure which newsgroup to post this in, so I'm putting it in the general one. I am simply trying to get my ASP.Net application to connect to a SQL database (on a different server) using an...
1
Paxxer
by: Paxxer | last post by:
I use Forms authentication with a SQL Server database. The portion of the Web.config Looks like this . <authentication mode="Forms" > <forms timeout="43200" ...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.