473,480 Members | 1,498 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

Authentication at Instance Vs Authentication at Database

I am confused between Authentication at Instance Vs Authentication at
Database. Instance authentication is specified at Instance creation
time (db2icrt) and is stored in db mgr. cfg. file while Database
authentication is specified during the Catalog Database command.

So far, so good. But when do each of the authentications come into
"picture"? For example, when a remote client attempts to access a
database, does it first authenticate at the instance level and then at
the database level?

What about local clients? How do they authenticate?

TIA
Raquel.
Nov 12 '05 #1
3 3189
Administrator ATTACH to the instance for administration.

Application programs and users CONNECT to databases to access the data.

Norm

ra****************@yahoo.com (Raquel) wrote in message news:<9a**************************@posting.google. com>...
I am confused between Authentication at Instance Vs Authentication at
Database. Instance authentication is specified at Instance creation
time (db2icrt) and is stored in db mgr. cfg. file while Database
authentication is specified during the Catalog Database command.

So far, so good. But when do each of the authentications come into
"picture"? For example, when a remote client attempts to access a
database, does it first authenticate at the instance level and then at
the database level?

What about local clients? How do they authenticate?

TIA
Raquel.

Nov 12 '05 #2
Raquel,

Authentication is done by the DB2 agent while processing the database
connection request. The DBM CFG AUTHENTICATION parameter determines how to
authenticate a user for all databases in that instance.

The authentication parameter on the CATALOG DB command tells the client what
authentication method is being used on the DB2 server. The client uses this
information to determine what to send to the DB2 server and how to send it
(for example, encrypted or not encrypted). The catalog entry should match
or be compatible with the instances DBM CFG AUTHENTICATION parameter. You
can not use the CATALOG DB command to override the servers authentication
method.

Database security is based on the users authority and/or privileges. To
connect to a database, the user needs CONNECT privilege, but no further
authentication is done.

Authentication works the same if you ATTACH to the instance.
"Raquel" <ra****************@yahoo.com> wrote in message
news:9a**************************@posting.google.c om...
I am confused between Authentication at Instance Vs Authentication at
Database. Instance authentication is specified at Instance creation
time (db2icrt) and is stored in db mgr. cfg. file while Database
authentication is specified during the Catalog Database command.

So far, so good. But when do each of the authentications come into
"picture"? For example, when a remote client attempts to access a
database, does it first authenticate at the instance level and then at
the database level?

What about local clients? How do they authenticate?

TIA
Raquel.

Nov 12 '05 #3
Thank you very much Bill for your very lucid response.

Raquel.
Nov 12 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

7
2910
by: jrefactors | last post by:
I want to ask how password is stored and how to check the authentication? I have heard password is never encrypted and decrypted, but it is hashed. For example, consider a simple email logon...
2
1549
by: wschlichtman | last post by:
In my Windows application, I am attempting to access an SQL database called PhotoAlbum.mdf. I keep receiving the following error: Cannot open database "PhotoAlbum" requested by the login. The...
0
4189
by: Anonieko Ramos | last post by:
ASP.NET Forms Authentication Best Practices Dr. Dobb's Journal February 2004 Protecting user information is critical By Douglas Reilly Douglas is the author of Designing Microsoft ASP.NET...
2
4605
by: Maziar Aflatoun | last post by:
Hi guys, I'm using Windows authentication to connect to SQL Server 2000. On my computer the connection is fine. Now if I move it to a remote server, how to I hard code my Username/Password in...
7
3010
by: Alice Wong | last post by:
I am setting up my Web ASP.net application to connect to Sql server using windows authentication. I set up IIS to have integrated windows authenication and sql to allow Windows authentication....
0
3427
by: Kofa | last post by:
Hi, I cannot create/drop databases from the command line, only from the GUI. Below is a detailed description of my installation and configuration attempts (sorry about the long post). I'm...
2
1991
by: Frank Swarbrick | last post by:
Here's a question I posted to the VSE list. I know there are few if any VSE users around here, but I thought a z/OS person (or even another OS) might be able to answer... Still pondering VSE...
0
2912
by: Benjamin Gufler | last post by:
Hello NG, I'm experiencing problems in configuring DB2 v9.1 on Linux (RedHat AS4) to use Kerberos authentication against an AD (W2K3 R2). IBM Network Authentication Service is installed and...
16
4173
by: rogerjames1 | last post by:
How would I go about protecting a whole directory, e.g. http://www.example.com/members/ and all sub-directories with login protection? I wouldn't like to put a .php script in each directory and...
0
7044
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
6908
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
6944
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
5341
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
1
4782
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
2995
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
0
2985
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
563
muto222
php
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
182
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.