isql Command Line Options for Security

There are several command line options that you can use with isql to enable network-based security services for the connection to Replication Server.

isql Command Line Options for Security

Option name

Meaning

-K keytab_file

Use only with DCE security. It specifies a DCE keytab file that contains the security key for the user logging into the server. Keytab files can be created with the DCE dcecp utility—see your DCE documentation for more information. Replication Server must have read permission on this file.

Note: For Kerberos users: Specify the location of the key table file using the key table registry key entry (Windows 2000 or 2003).

-S server_name

Specifies the server’s network name. If unified login is enabled, this option also specifies the principal user.

-V security_options

Specifies unified login. With this option, the user must log in to the network’s security system before running the isql utility. If a user specifies the -U option, the user must supply the network user name known to the security mechanism; any password supplied with the -P option is ignored.

-V can be followed by a string of options that enable additional security services. Here is a list of options and the services they enable.
  • c – data confidentiality

  • i – data integrity

  • m – mutual authentication

  • o – data origin stamping service

  • r – data replay detection

  • q – out-of-sequence detection

-X

Specifies that connections are made with encrypted passwords.

-Z security_mechanism

Specifies the name of a security mechanism to use on the connection to Replication Server.

Supported security mechanism names are listed in the libtcl.cfg file. If no security mechanism is supplied, the default is used, which is the first security mechanism listed under SECURITY in libtcl.cfg.