Book Image

IBM Db2 11.1 Certification Guide

By : Robert (Kent) Collins, Mohankumar Saraswatipura
Book Image

IBM Db2 11.1 Certification Guide

By: Robert (Kent) Collins, Mohankumar Saraswatipura

Overview of this book

IBM Db2 is a relational database management system (RDBMS) that helps you store, analyze, and retrieve data efficiently. This comprehensive book is designed to help you master all aspects of IBM Db2 database administration and prepare you to take and pass IBM's Certification Exams C2090-600. Building on years of extensive experience, the authors take you through all areas covered by the test. The book delves deep into each certification topic: Db2 server management, physical design, business rules implementation, activity monitoring, utilities, high availability, and security. IBM Db2 11.1 Certification Guide provides you with more than 150 practice questions and answers, simulating real certification examination questions. Each chapter includes an extensive set of practice questions along with carefully explained answers. This book will not just prepare you for the C2090-600 exam but also help you troubleshoot day-to-day database administration challenges.
Table of Contents (10 chapters)

Trusted context and trusted connections

A trusted context is a database object that defines a trust relationship for a connection between the database and an external entity such as a middle-tier application server (for example, the IBM WebSphere Application Server). The trust relationship is built based on the following set of attributes:

  • Authorization ID: Identifies the user who establishes a connection to the database
  • IP address or domain name: Identifies the host name from which a database connection is established to the database server
  • Data stream encryption: Identifies the data stream's minimum level of encryption between the database server and the client

A person holding SECADM authority can create a trusted context by using the CREATE TRUSTED CONTEXT statement. The basic syntax is:

CREATE TRUSTED CONTEXT <ContextName>

BASED ON CONNECTION USING SYSTEM...