1/31/2016

Performance tuning tools and methodology

Benchmark testing: Benchmark testing is a normal part of the application development life cycle. It is a team effort that involves both application developers and database administrators(DBAs). Benchmark testing is performed against a system to determine current performance and can be used to improve application performance. If the application code has been written as efficiently as possible, additional performance gains might be realized by tuning database and database manager configuration parameters. Different types of benchmark tests...

1/11/2016

File Permimission Requirements for the Instance and Database Directories

The DB2 database system requires that your instance and database directories have a minimum level of permissions. Note: When the instance and database directories are created by the DB2 database manager, the permissions are accurate and should not be changed. The minimum permissions of the instance directory and the NODE000x/sqldbdir directory on UNIX and Linux machines must be: u=rwx and go=rx. The meaning of the letters is explained in the following table: Character Represents: u User (owner) g Group o Other users r Read w ...

1/04/2016

Security considerations when installing and using the DB2 database manager

Important to the DB2 administrator from the moment the product was installed are Security Considerations. A user ID, a group name, and a password are required to complete the installation of DB2 database manager. If you install a GUI-based DB2 database manager that only creates default values for different user IDs and the group.  Depending on the OS platform different defaults will be created. On UNIX and Linux operating systems, if you choose to create a DB2 instance in the instance setup window, the DB2 database install program creates,...

1/02/2016

Authentication & Authorization process in DB2

Authentication: The process that verifies user identity at OS level is known as "authentication". The security product can be part of the OS or a separate product. To authenticate a user security facility requires two items: 1. User ID 2. Password The user ID identifies the user to the security facility. By supplying the correct password, information known only to the user and the security facility, the user's identity (corresponding to the user ID) is verified. What will happen after being authenticated: 1. The user must be identified to...

1/01/2016

DB2 Database Security Model

The DB2 database system data and functions have two modes of security controls 1. Authentication (Outside the DB2 database system) 2. Authorization (Managed by database manager) Authentication:  1. The process that verifies user identity at OS level is known as "authentication". 2. In this the authentication of user completed by a secure facility outside the DB2 database system         using an authentication...

ads