Book Image

IBM DB2 9.7 Advanced Administration Cookbook

Book Image

IBM DB2 9.7 Advanced Administration Cookbook

Overview of this book

IBM DB2 LUW is a leading relational database system developed by IBM. DB2 LUW database software offers industry leading performance, scale, and reliability on your choice of platform on various Linux distributions, leading Unix Systems like AIX, HP-UX and Solaris and MS Windows platforms. With lots of new features, DB2 9.7 delivers one the best relational database systems in the market. IBM DB2 9.7 Advanced Administration Cookbook covers all the latest features with instance creation, setup, and administration of multi-partitioned database. This practical cookbook provides step-by-step instructions to build and configure powerful databases, with scalability, safety and reliability features, using industry standard best practices. This book will walk you through all the important aspects of administration. You will learn to set up production capable environments with multi-partitioned databases and make the best use of hardware resources for maximum performance. With this guide you can master the different ways to implement strong databases with a High Availability architecture.
Table of Contents (21 chapters)
IBM DB2 9.7 Advanced Administration Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Index

Using table encryption


In DB2, we may use encryption in two areas: network communication and table data encryption. Regarding network communication, also named data in transit, we can enforce the encryption of just the authorization identifiers, such as the username and password, by setting database manager parameter AUTHENTICATION or SRVCON_AUTH to SERVER_ENCRYPT, SERVER_ENCRYPT, GSS_SERVER_ENCRYPT, KRB_SERVER_ENCRYPT or to encrypt authentication and data sent over the network between clients and servers by setting to DATA_ENCRYPT or DATA_ENCRYPT_CMP values. Here, we can also enumerate SSL as encryption method for data in transit. Table data encryption is used, in general, to hide sensitive data from users who have access to those tables and it also offers protection against physical theft.

Getting ready

In this recipe, we will encrypt the CNAM column of the NAV.COMM table to demonstrate how to use data encryption.

How to do it...

The function used to encrypt columns is encrypt. For decryption...