Book Image

IBM DB2 9.7 Advanced Application Developer Cookbook

Book Image

IBM DB2 9.7 Advanced Application Developer Cookbook

Overview of this book

With lots of new features, DB2 9.7 delivers one the best relational database systems in the market. DB2 pureXML optimizes Web 2.0 and SOA applications. DB2 LUW database software offers industry leading performance, scale, and reliability on your choice of platform on various Linux distributions, leading Unix Systems like AIX, HP-UX and Solaris and MS Windows platforms. This DB2 9.7 Advanced Application Developer Cookbook will provide an in-depth quick reference during any application's design and development. This practical cookbook focuses on advanced application development areas that include performance tips and the most useful DB2 features that help in designing high quality applications. This book dives deep into tips and tricks for optimized application performance. With this book you will learn how to use various DB2 features in database applications in an interactive way.
Table of Contents (15 chapters)
IBM DB2 9.7 Advanced Application Developer Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface

Using trusted contexts for improved security


DB2 provides various levels of security like authorization, authentication, privileges, roles, and so on. We can limit user access by setting the proper restrictions at any level. We can only apply these restrictions to a user, a role, or a group. It also means that if we use generic authorization IDs, then we cannot provide granular security. This is the exact problem we face in 3-tier architecture. In this architecture, we have the application server between the database and the application. The application server runs all the queries against the database on behalf of the application and this is done by the authorization ID, available at the application server. Because we also want this authorization ID to be able to perform all the tasks, we end up giving most of the privileges to this generic authorization ID and hence we are exposed to a security compromise.

To overcome this situation, DB2 provides a new functionality, known as trusted connections...