Benchmark testing:
Benchmark testing
is a normal part of the application development life cycle. It is a team effort
that involves both application developers and database administrators(DBAs).
Benchmark testing
is performed against a system to determine current performance and can be used
to improve application performance. If the application code has been written as
efficiently as possible, additional performance gains might be realized by tuning
database and database manager configuration parameters.
Different types of
benchmark tests...
1/31/2016
1/11/2016
File Permimission Requirements for the Instance and Database Directories
The DB2 database system requires that your instance and database directories have a minimum level of permissions.
Note: When the instance and database directories are created by the DB2 database manager, the permissions are accurate and should not be changed.
The minimum permissions of the instance directory and the NODE000x/sqldbdir directory on UNIX and Linux machines must be: u=rwx and go=rx. The meaning of the letters is explained in the following table:
Character Represents:
u User (owner)
g Group
o Other users
r Read
w ...
1/04/2016
Security considerations when installing and using the DB2 database manager
Important to the DB2 administrator from the moment the product was installed are Security Considerations.
A user ID, a group name, and a password are required to complete the installation of DB2 database manager. If you install a GUI-based DB2 database manager that only creates default values for different user IDs and the group. Depending on the OS platform different defaults will be created.
On UNIX and Linux operating systems, if you choose to create a DB2 instance in the instance setup window, the DB2 database install program creates,...
1/02/2016
Authentication & Authorization process in DB2
Authentication:
The process that verifies user identity at OS level is known as "authentication". The security product can be part of the OS or a separate product.
To authenticate a user security facility requires two items:
1. User ID
2. Password
The user ID identifies the user to the security facility. By supplying the correct password, information known only to the user and the security facility, the user's identity (corresponding to the user ID) is verified.
What will happen after being authenticated:
1. The user must be identified to...
1/01/2016
DB2 Database Security Model

The DB2 database system data and functions have two modes of security controls
1. Authentication (Outside the DB2 database system)
2. Authorization (Managed by database manager)
Authentication:
1. The process that verifies user identity at OS level is known as "authentication".
2. In this the authentication of user completed by a secure facility outside the DB2 database system using an authentication...