Home | Previous Page | Next Page   The Database Server >

Security

In This Chapter
Server Utility Security Before Starting on UNIX and Linux
Disabling Security Checking
Securing an Insecure Environment
Warning and Error Messages for Utility Security Checks
INFORMIXDIR Directory Permissions
Users and Group Membership for Running Dynamic Server Utilities
Setting Up Security for Local Connections to a Host
Auditing Database Events
Setting Permission to Create Databases
User Roles
Default Roles
Limiting Denial-of-Service Flood Attacks
Using the LISTEN_TIMEOUT and MAX_INCOMPLETE_CONNECTIONS Parameters
Using the onmode -wm and onmode -wf Options to Change Parameter Values
Encryption
Overview of Encryption and Encryption Options
Using Communication Support Modules (CSMs) for Password and Data Transmission Encryption
CSM Configuration File
Configuring Password Encryption
Configuring Network Data Encryption
Using Column-Level Encryption
Storage Considerations
Encrypting Column Data
Example Showing How to Determine the Size of an Encrypted Column
Example Showing How to Encrypt a Column
Example Showing How to Query Encrypted Data
Authentication Modules
Pluggable Authentication Modules for Systems Running on UNIX or Linux
Supported Platforms
The Name of the PAM Service
Authentication Mode
Required Stack Size
Implicit Connections
Configuring a Database Server to Use PAM
Enterprise Replication and High-Availability Data Replication
Application Development
Distributed Transactions with PAM, Client APIs, and Compatibility Issues
LDAP Authentication Support on Windows
Installing and Customizing the LDAP Authentication Support Module
Configuring the LDAP Module
Configuring Dynamic Server
Authentication Mode
Implicit Connections
Enterprise Replication and High-Availability Data Replication
Application Development
Distributed Transactions with LDAP Support Modules, Client APIs, and Compatibility Issues
Application Development for Authentication Modules
Distributed Transactions
Client APIs and Authentication Support Modules
Compatibility Issues
Enterprise Replication and High-Availability Data Replication Connection Security Option
Security for External Routines (UDRs)
Security for Loading External Modules
Enabling non-DBAs to View SQL Statements a Session Is Executing
Home | [ Top of Page | Previous Page | Next Page | Contents | Index ]