+

Search Tips   |   Advanced Search

(iseries)

Configure data access security

Safeguard access to the enterprise data by designating credentials that WAS uses to authenticate database connections.

Review the history and roles of the database tables in our environment; this information helps you determine the best approach for securing each table. We can either rely on the default authentication mechanism of a user profile, or override it by configuring a security scheme for the individual application component that requires access to the database. Generally, consider overriding the default profile security if the database tables were created prior to the Application Server installation, or if programs outside of Application Server also access the tables.

To authenticate database connections with user profile credentials, use an existing profile from any of three scopes in the application serving environment. Otherwise, consult the following Application component authentication table for methods of overriding user profile settings.


Related concepts

  • Java EE connector security


    Related tasks

  • Manage Java 2 Connector Architecture authentication data entries for JAAS

  • Data source settings