From: Ultrak The DBA on
Is there a query from a snapshot table, or some other method, to
monitor that a database is using trusted context connections? My
company is requesting that I run a report from our monitoring server
and report any non-compliant databases. Any assistance would be
greatly appreciated. We are running DB2 V9.5.0.4 on AIX.

Thank you.

Kermit L
From: Serge Rielau on
On 3/10/2010 9:14 AM, Ultrak The DBA wrote:
> Is there a query from a snapshot table, or some other method, to
> monitor that a database is using trusted context connections? My
> company is requesting that I run a report from our monitoring server
> and report any non-compliant databases. Any assistance would be
> greatly appreciated. We are running DB2 V9.5.0.4 on AIX.
There is no monitoring, but there is auditing. Take a look in that area.
I'm told there are three fields in the audit records dedicated to
trusted context.

Cheers
Serge

--
Serge Rielau
SQL Architect DB2 for LUW
IBM Toronto Lab

From: Serge Rielau on
The audit record layout can be found here:
http://publib.boulder.ibm.com/infocenter/db2luw/v9r7/topic/com.ibm.db2.luw.admin.sec.doc/doc/c0005633.html


--
Serge Rielau
SQL Architect DB2 for LUW
IBM Toronto Lab

From: The Boss on
Ultrak The DBA wrote:
> Is there a query from a snapshot table, or some other method, to
> monitor that a database is using trusted context connections? My
> company is requesting that I run a report from our monitoring server
> and report any non-compliant databases. Any assistance would be
> greatly appreciated. We are running DB2 V9.5.0.4 on AIX.
>
> Thank you.
>
> Kermit L

In addition to the link provided by Serge, here's some more:

"DB2 UDB security, Part 5: Understand the DB2 audit facility"
http://www.ibm.com/developerworks/data/library/techarticle/dm-0603wasserman/index.html
(Based on v8, but still useful)

InfoCenter topic: "db2audit - Audit facility administrator tool command"
http://publib.boulder.ibm.com/infocenter/db2luw/v9r5/index.jsp?topic=/com.ibm.db2.udb.doc/admin/t0011541.htm

Couple of articles on Rebecca Bond's blog (what's in a name...):
http://www.dbisoftware.com/blog/db2_security.php?id=151
http://www.dbisoftware.com/blog/db2_security.php?id=156
http://www.dbisoftware.com/blog/db2_security.php?id=162
http://www.dbisoftware.com/blog/db2_security.php?id=185

Cheers!

--
Jeroen