Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
IBM DB2 9.7 Advanced Administration Cookbook

You're reading from   IBM DB2 9.7 Advanced Administration Cookbook Over 100 recipes focused on advanced administration tasks to build and configure powerful databases with IBM DB2 book and ebook

Arrow left icon
Product type Paperback
Published in Feb 2012
Publisher Packt
ISBN-13 9781849683326
Length 480 pages
Edition 1st Edition
Tools
Arrow right icon
Toc

Table of Contents (21) Chapters Close

IBM DB2 9.7 Advanced Administration Cookbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
1. DB2 Instance—Administration and Configuration FREE CHAPTER 2. Administration and Configuration of the DB2 Non-partitioned Database 3. DB2 Multipartitioned Databases—Administration and Configuration 4. Storage—Using DB2 Table Spaces 5. DB2 Buffer Pools 6. Database Objects 7. DB2 Backup and Recovery 8. DB2 High Availability 9. Problem Determination, Event Sources, and Files 10. DB2 Security 11. Connectivity and Networking 12. Monitoring 13. DB2 Tuning and Optimization 14. IBM pureScale Technology and DB2 Index

Using table encryption


In DB2, we may use encryption in two areas: network communication and table data encryption. Regarding network communication, also named data in transit, we can enforce the encryption of just the authorization identifiers, such as the username and password, by setting database manager parameter AUTHENTICATION or SRVCON_AUTH to SERVER_ENCRYPT, SERVER_ENCRYPT, GSS_SERVER_ENCRYPT, KRB_SERVER_ENCRYPT or to encrypt authentication and data sent over the network between clients and servers by setting to DATA_ENCRYPT or DATA_ENCRYPT_CMP values. Here, we can also enumerate SSL as encryption method for data in transit. Table data encryption is used, in general, to hide sensitive data from users who have access to those tables and it also offers protection against physical theft.

Getting ready

In this recipe, we will encrypt the CNAM column of the NAV.COMM table to demonstrate how to use data encryption.

How to do it...

The function used to encrypt columns is encrypt. For decryption...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime