473,399 Members | 3,401 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,399 software developers and data experts.

user authentication

hi,

can user connect to db2 server without providing username and password
from client?

regards

May 4 '06 #1
8 1454
Yes, there's a setting parm. in the instance config. file for the server
that defines
AUTHENTICATION CLIENT
This means that the client is responsible for providing an id at connect
time that the server will "blindly" accept.
From then on, anything that happens to your instance and/or server is
thoroughly deeserved.

You are asking the server to accept any connection that has been verfified a
t the client.
All I'd need is get the instance owner name on my windows xp laptop and
build an id there with it and ant pw.
I'd logon on my laptop with that id and then issue a connect request to your
server and be accepted as the instance owner there: and could I get
creative?????

HTH, Pierre.

--
Pierre Saint-Jacques
SES Consultants Inc.
514-737-4515
"db2admin" <ja****@gmail.com> a écrit dans le message de news:
11**********************@v46g2000cwv.googlegroups. com...
hi,

can user connect to db2 server without providing username and password
from client?

regards


May 4 '06 #2
i do not want to compromise security
is there a way to set specific usernames of groups and unix hostnames (
clients ) which can connect to db2 server ?

May 4 '06 #3
Ian
db2admin wrote:
i do not want to compromise security
is there a way to set specific usernames of groups and unix hostnames (
clients ) which can connect to db2 server ?


You can control who can connect by REVOKING CONNECT authority on your
database from PUBLIC, and then granting to the specific users or groups.

You can prevent these users from actually logging in to the server
using whatever method you prefer.

May 4 '06 #4
db2admin wrote:
i do not want to compromise security
is there a way to set specific usernames of groups and unix hostnames (
clients ) which can connect to db2 server ?

Yes ... you must set them up using the facilities of the OS
(etc/group/passwd). That's what DB2 uses.

Larry Edelstein
May 4 '06 #5
Yes, as Larry says in the next answer, you can use the OS to identify id's
and groups.
The users will have to provide the id and the password when they connect,
which goes against your initial request of your first post:

"can user connect to db2 server without providing username and password
from client?"

It seems you want to have your cake and eat it too.
You don't want to provide a username and a password BUT you don't want to
com^romise security.
By the way what security if there's no way to identify the user?

Maybe a little more explanation on what you are trying to achieve might help
us!!!!

HTH, Pierre.
--
Pierre Saint-Jacques
SES Consultants Inc.
514-737-4515
"db2admin" <ja****@gmail.com> a écrit dans le message de news:
11**********************@u72g2000cwu.googlegroups. com...
i do not want to compromise security
is there a way to set specific usernames of groups and unix hostnames (
clients ) which can connect to db2 server ?


May 5 '06 #6
The best solution is to use Kereros. The user logs on to his workstation via
whatever security technology you have in place (e.g. smartcard), and
Kerberos handles the issues of distributed security. DB2 will leverage the
O/S Kerberos when configured to do so. Since you didn't list your platforms,
I'll have to refer you to the DB2 and O/S documentation for the details on
implementing Kerberos. There are also some good white papers on the DB2 web
site that address these issues.

The list of users / groups that may connect is controlled by GRANT / REVOKE
statements. The DB2 documentation explains GRANTs.

"db2admin" <ja****@gmail.com> wrote in message
news:11**********************@v46g2000cwv.googlegr oups.com...
hi,

can user connect to db2 server without providing username and password
from client?

regards

May 5 '06 #7
In article <11**********************@v46g2000cwv.googlegroups .com>,
db2admin <ja****@gmail.com> wrote:
hi,

can user connect to db2 server without providing username and password
from client?


Yes, but to do so securely requires the use of the client and server
side security plugins.

In my workplace, we use the GSS security plugins to perform the DB2
security handshake based on Kerberos tickets that are established when
the user first logins in to the Unix/Windows system.

However, that only work if your OS environment already contains the
required Kerberos support - simple on Windows 2000/XP with Active
Directory, but not simple on Unix unless you're already a Kerberos shop.

If you don't have a good system programmer available to your DBA staff,
or you don't have the ability to make sure a shared library / DLL is
installed and mainrtained on all clients, then the security plugins are
a no-go.

Hildo
May 6 '06 #8
thanks to all

we use AIX / DB2 .
certain users hard code their password in scripts from clients
connecting to UDB servers
they do not want to do that because anybody can look their password
from those text scripts.
they need ability to connect to database without providing passwords
and usernames.
kerberos will be a major infrastructure change which can be difficult
to implement

May 10 '06 #9

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: Tim Daneliuk | last post by:
OK, I've Googled for this and cannot seem to quite find what I need. So, I turn to the Gentle Geniuses here for help. Here is what I need to do from within a script: Given a username and a...
4
by: Dan Bart | last post by:
I am using an application which is a modification of IBuySpy Portal. It is using Forms authentication. Users login and their name is added to Context Then I use: ...
5
by: Matthew Louden | last post by:
I wrote ASP.NET application that access SQL Server database. When I run the application, it yields "Login failed for user '<COMPUTER_NAME>\ASPNET'" error message. I then did the following, but...
8
by: Joe | last post by:
I check for the NTLogin of a user by Page.User.Identity.Name, but when I put the app on the server the value for Page.User.Identity.Name is "" I had the <allow users="*/> attribute commented...
15
by: Tom Nowak | last post by:
I am writing a webapp in which a user is required to enter a login id and password on a login form. I have forms authenticaion coded in my web.config. Once the user is logged in, I want to use the...
1
by: noor | last post by:
hi, can any one tell me a javascript that can be called on mouseover event of a html link control . script can check from session either a user is login or not In the case of Login it will...
2
by: J | last post by:
Hello. I apologize if this isn't the appropriate group for this question but I was wondering if it's possible to allow regular windows domain users to change their passwords through an .asp page? ...
3
by: mario.colorado | last post by:
Hi! Does anyone know why it is that when I use: Request.LogonUserIdentity.User.ToString() I get something like: S-1-5-21-2268419..........
9
by: webrod | last post by:
Hi all, how can I check a user/password in a LDAP ? I don't want to connect with this user, I would like to connect to LDAP with a ADMIN_LOG/ADMIN_PWD, then do a query to find the user and...
6
by: MuZZy | last post by:
Hi, I am looking to find a way to get currently logged in user's object GUID without querying ActiveDirectory. For example, when i log in to my laptop from home, I'm not on the office network so...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.