Network Deployment (Distributed operating systems), v8.0 > Secure applications and their environment > Secure Data access resources


Secure data sources


  1. Java EE connector security
  2. Enable trusted context for DB2 databases
  3. Configure the application server and DB2 to authenticate with Kerberos

 

+

Search Tips   |   Advanced Search