Contact your database administration or refer to the DB2 documentation for more information about the security configuration of your DB2 instance.
联系您的数据库管理员或参考db 2文档了解关于您的DB 2实例的安全配置的更多信息。
To enable this configuration, you must disable database privacy and security for the local DCI.
为了激活这个配置,您必须关闭数据库对本地dci的安全性。
Table 2 provides a list of the database manager configuration parameters that apply to plug-ins, and an explanation of how they apply to security plug-ins.
表2提供了应用于插件的数据库管理器配置参数列表,并解释了它们如何应用于安全性插件。
You can also specify security Settings and database configuration options within the installation and configuration wizards.
您还可以在安装和配置向导内指定安全设置和数据库配置。
Each instance also has its own configuration file, the Database Manager configuration file (DBM CFG) for instance level security, performance variables, and communication configuration.
每个实例还具有自己的配置文件,数据库管理器配置文件(DBMCFG)用于进行实例级的安全、性能变量和通信配置。
Security probes that verify a database ACL against a predetermined configuration and that check for inconsistencies in security configurations across multiple servers.
安全探测器,根据预先确定的配置来验证数据库acl,检查多台服务器中不一致的安全配置。
If the database is remote, for improved security it is recommended to configure the remote database connection to use data encryption - that is, turn on the data_encrypt configuration parameter.
如果数据库是远程的,那么为了提高安全性,建议为远程数据库连接配置数据加密—也就是,启用data_encrypt配置参数。
The most important configuration tasks that need to be performed on a Lotus Quickr installation are configuring the database, configuring security, and configuring the Web server.
LotusQuickr安装上需要执行的最为重要的配置任务是,配置数据库、配置安全性和配置Web服务器。
Security Settings are established using a combination of configuration Settings and data stored in a database (or other data store).
安全性设定是使用组态设定和资料库(或其他资料存放区)中储存之资料的组合来建立的。
Security Settings are established using a combination of configuration Settings and data stored in a database (or other data store).
安全性设定是使用组态设定和资料库(或其他资料存放区)中储存之资料的组合来建立的。
应用推荐