From: Ultrak The DBA on 10 Mar 2010 09:14 Is there a query from a snapshot table, or some other method, to monitor that a database is using trusted context connections? My company is requesting that I run a report from our monitoring server and report any non-compliant databases. Any assistance would be greatly appreciated. We are running DB2 V9.5.0.4 on AIX. Thank you. Kermit L
From: Serge Rielau on 10 Mar 2010 10:35 On 3/10/2010 9:14 AM, Ultrak The DBA wrote: > Is there a query from a snapshot table, or some other method, to > monitor that a database is using trusted context connections? My > company is requesting that I run a report from our monitoring server > and report any non-compliant databases. Any assistance would be > greatly appreciated. We are running DB2 V9.5.0.4 on AIX. There is no monitoring, but there is auditing. Take a look in that area. I'm told there are three fields in the audit records dedicated to trusted context. Cheers Serge -- Serge Rielau SQL Architect DB2 for LUW IBM Toronto Lab
From: Serge Rielau on 10 Mar 2010 11:05 The audit record layout can be found here: http://publib.boulder.ibm.com/infocenter/db2luw/v9r7/topic/com.ibm.db2.luw.admin.sec.doc/doc/c0005633.html -- Serge Rielau SQL Architect DB2 for LUW IBM Toronto Lab
From: The Boss on 10 Mar 2010 17:50 Ultrak The DBA wrote: > Is there a query from a snapshot table, or some other method, to > monitor that a database is using trusted context connections? My > company is requesting that I run a report from our monitoring server > and report any non-compliant databases. Any assistance would be > greatly appreciated. We are running DB2 V9.5.0.4 on AIX. > > Thank you. > > Kermit L In addition to the link provided by Serge, here's some more: "DB2 UDB security, Part 5: Understand the DB2 audit facility" http://www.ibm.com/developerworks/data/library/techarticle/dm-0603wasserman/index.html (Based on v8, but still useful) InfoCenter topic: "db2audit - Audit facility administrator tool command" http://publib.boulder.ibm.com/infocenter/db2luw/v9r5/index.jsp?topic=/com.ibm.db2.udb.doc/admin/t0011541.htm Couple of articles on Rebecca Bond's blog (what's in a name...): http://www.dbisoftware.com/blog/db2_security.php?id=151 http://www.dbisoftware.com/blog/db2_security.php?id=156 http://www.dbisoftware.com/blog/db2_security.php?id=162 http://www.dbisoftware.com/blog/db2_security.php?id=185 Cheers! -- Jeroen
|
Pages: 1 Prev: Discover Location Intelligence Next: Doing a join on a non-numeric column? |