Network Security and Trust Relationships

Since the Informix database products stem from a UNIX environment, it is not surprising that the model for security is the UNIX model. In a UNIX environment it is required that a user have a valid entry in the /etc/passwd (or /etc/shadow) files. Informix uses the UNIX security to decide whether or not to let the user into the system, and Informix takes the security a step further by specifying access to tables and other data objects within the database itself. For now, we are just interested in the ability for a user to get into the system, that is, get past the UNIX security.

The dbaccess program is a good example of the nature of this security. When dbaccess starts up on a remote (client) machine, the ...

Get Informix DBA Survival Guide, Second Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.