本文讨论为了很好地理解DB 2安全性插件而需要知道的方方面面,并讨论不同类型的安全性插件,它们为什么如此重要,以及如何使用它们。
This article discusses everything you need to know to have a good understanding of DB2 security plug-ins, the different types of security plug-ins, why they are important, and how to use them.
安全性插件是按每个实例实现的,因此可以创建不同的实例,使用不同的安全性插件实现。
Security plug-ins are implemented per instance, therefore you can create different instances, and have different security plug-in implementations.
本文对安全性插件进行了概述,首先提到了安全性插件的优点,以及安全性插件与标准安全性设施相比的优势。
This article provided you with an overview of security plug-ins, starting with the benefits of security plug-ins and their advantages over standard security facilities.
DB 2提供安全性插件基础设施和一些缺省的安全性插件。
DB2 provides the security plug-in infrastructure and some default security plug-ins.
RM可有多种方法、以插件方式在其他安全模型中工作。
In many ways RM just plugs in with whatever other security model is already in place.
通过本文还可以了解安全性插件的一些限制,使用安全性插件时可能遇到的一些常见问题,从而有助于您在实现自己的安全性插件时调试问题。
You learned about restrictions on security plug-ins, and common errors encountered while working with them to help you debug problems when implementing security plug-ins on your own.
在开发安全插件时,需要实现DB 2udb调用的标准身份验证函数。
When you develop a security plug-in, you will need to implement the standard authentication functions that DB2 UDB invokes.
本系列的第2部分主要关注DB 2安全性插件,这是实现DB 2安全性的新方法。
Part 2 of this series focuses on DB2 security plug-ins, the new method that implements DB2 security.
然后还将描述:如何通过使用新的具有可定制的DB 2UDB安全插件的GSS - API安全机制来实现基于公钥技术的身份验证。
It then describes how you can achieve authentication based on public key technology, using the new GSS-API security mechanisms with the customizable DB2 UDB security plug-ins.
如果没有明确配置安全插件,则使用默认的安全插件。
If a security plug-in has not been explicitly configured, the default plug-in is used.
为了允许定制DB2UDB身份验证行为,DB2 UDB 提供了可用来修改现有插件或构建新的安全插件的API。
To enable you to customize DB2 UDB authentication behavior, DB2 UDB has exposed APIs that you can use to modify existing plug-ins or build new security plug-ins.
用于身份验证的DB 2UDB安全插件。
操作系统确认bob/bobpsw组合是否有效,把该信息返回给安全插件。
The operating system confirms whether the bob/bobpsw combination is valid or not, and returns this information to the security plug-in.
注意,JCC客户机不支持定制的基于用户ID/密码的安全性身份验证插件和定制的组查找安全性插件。
Note that the JCC client does not support customized user ID/password-based security plug-ins for authentication or customized group lookup security plug-ins.
如果不想使用缺省插件,那么既可以编写自己的安全性插件,也可以从第三方供应商购买安全性插件。
If you don't want to use the default plug-ins, you can either write your own security plug-ins, or buy them from a third-party vendor.
现在您应知道如何使用安全性插件loader来测试定制的安全性插件,该loader可以在下载部分中找到。
You should now understand how to use the security plug-in loader, which is found in the Download section, to test customized security plug-ins.
将安全性插件的头文件包括到插件中。
步骤1:将安全性插件头文件包括到插件中。
Step 1: Include the security plug-in header files in your plug-in.
注意:DB 2UD b手册有一节详细描述了如何开发安全性插件,并解释了安全性插件api。
Note: the DB2 manuals have a section that describes in detail how to develop security plug-ins, as well as explanations of the security plug-in APIs.
插件历来是网络恶意软件攻击的主要对象——尤其是Adobe的Flash和Acrobat插件,安全问题遭人诟病已久。
Plug-ins have historically been a major attack vector for Internet malware—particularly Adobe's Flash and Acrobat plug-ins, which are notoriously insecure.
基于前文所述的安全性插件职责,建议安全性插件至少应进行下面的测试。
Based on the duties of the security plug-in that was described in the previous section, it is suggested that the security plug-in should go through the following testing at a minimum.
此外,Windows7还需要安全软件插件,必须频繁更新。
Also, Windows 7 still requires add-on security software that has to be frequently updated.
组成员查找安全性插件(即组插件)。
编写支持SPKM/LIPKEY安全机制的定制的GSS-API 安全插件。
Write customized GSS-API security plug-ins that will support SPKM/LIPKEY security mechanisms.
如果运行非最新插件,你的计算机更容易受安全攻击,因为旧插件没有最新安全补丁。
Your computer iseven more vulnerable to security attacks if you're running plug-ins that aren'tup to date, because out-of-date plug-ins don't contain the latest securityfixes.
本文描述如何设计和开发一种特定类型的安全性插件,这种安全性插件使用DB2数据库存储身份验证信息。
This article describes the design and development process of a specific type of security plug-in, one that uses a DB2 database to store authentication information.
本系列的第10部分描述了如何部署定制的安全性插件。
Part 10 of this series described how customized security plug-ins can be deployed.
这样确保定制的安全性插件将正确的登录用户凭证返回到DB2。
This ensures the right login user credential is returned by the customized security plug-in to DB2.
本文还提供了一些安全性插件程序示例,并展示如何逐步实现它们。
It also includes sample security plug-in programs, and shows you how to implement them step by step.
图2展示了安全性插件所提供的灵活性和可扩展性。
Figure 2 shows the flexibility and extensibility provided by using security plug-ins.
应用推荐