The objective of this chapter was to provide the ability to answer Db2 security chapter questions on the following topics:
- Db2 authentication and authorization concepts
- The LDAP authentication configuration within Db2 using the transparent LDAP feature
- Db2 trusted contexts and trusted connection implementation concepts
- SSL configuration to encrypt data in-flight, and Db2 native encryption to encrypt data at rest
- The Db2 audit facility to implement and monitor unknown or unexpected access to the database