Securing data sources

What to do next

  • J2EE connector security

    The Java™ 2 Platform, Enterprise Edition (J2EE) connector architecture defines a standard architecture for connecting J2EE to heterogeneous enterprise information systems (EIS). Examples of EIS include Enterprise Resource Planning (ERP), mainframe transaction processing (TP) and database systems.

  • Enabling trusted context for DB2 databases

    Enable trusted context in your applications to improve how the application server interacts with DB2® database servers. Use trusted connections to preserve the identity records of clients that are connecting to a DB2 database through your applications; trusted connections can provide a more secure environment by granting access based on the identity of those users.

  • Configuring the application server and DB2 to authenticate with Kerberos

    The Kerberos authentication mechanism may be used when both WebSphere® Application Server and the DB2 server are configured for Kerberos authentication. Kerberos authentication can provide single sign on (SSO) end-to-end interoperable solutions and preserves the original requester identity.

  • Configuring data access security

    Safeguard access to your enterprise data by designating credentials that WebSphere Application Server uses to authenticate database connections.

Task topic    

Terms of Use | Feedback

Last updated: Oct 20, 2010 11:50:58 PM CDT
http://www14.software.ibm.com/webapp/wsbroker/redirect?version=compass&product=was-base-iseries&topic=container_data_security
File name: container_data_security.html