Administering network-based security

Table 5-1 provides an overall process for using the network-based security functions provided by Adaptive Server. You must install Adaptive Server before you can complete the steps in Table 5-1.

Table 5-1: Administering network-based security

Step

Description

See

1. Set up configuration files:

  • libtcl.cfg

  • objectid.dat

  • interfaces (or directory service)

Edit the libtcl.cfg file.Edit the objectid.dat file. Edit the interfaces file or Directory Service.

2. Make sure the security administrator for the security mechanism has created logins for each user and for the Adaptive Server and Backup Server.

The security administrator must add names and passwords for users and servers in the security mechanism.

3. Configure security for your installation.

Use sp_configure.

“Configuring Adaptive Server for security”

4. Restart Adaptive Server.

Activates the use security services parameter.

The Configuration Guide for your platform

5. Add logins to Adaptive Server to support enterprise-wide login.

Use create login to add login accounts. Optionally, specify a default secure login with sp_configure.

“Adding logins to support unified login”

6. Enable security mechanism for required remote servers.

Use security mechanism option of sp_serveroption to enable security mechanism for required remote servers.

“Establishing Kerberos security for remote connections”

7. Connect to the server and use security services.

Use isql_r or Open Client Client-Library to connect to Adaptive Server, specifying the security services you want to use.

8. Check the security services and security mechanisms that are available.

Use the functions show_sec_services and is_sec_services_on to check which security services are available.

For a list of security mechanisms and their security services supported by Adaptive Server, use select to query the syssecmechs system table.

“Getting information about available security services”