Network Security and Trust Relationships
Since the Informix database products stem from a UNIX environment, it is not surprising that the model for security is the UNIX model. In a UNIX environment it is required that a user have a valid entry in the /etc/passwd (or /etc/shadow) files. Informix uses the UNIX security to decide whether or not to let the user into the system, and Informix takes the security a step further by specifying access to tables and other data objects within the database itself. For now, we are just interested in the ability for a user to get into the system, that is, get past the UNIX security.
The dbaccess program is a good example of the nature of this security. When dbaccess starts up on a remote (client) machine, the ...
Get Informix DBA Survival Guide, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.