Displays or changes remote server options.
sp_serveroption [server, optname, optvalue]
Configures the SAP ASE server to require clients to use this protocol. Set the SAP ASE configuration parameter net password encryption reqd to require all username- and password-based authentication requests to use RSA asymmetric encryption. The valid values for net password encryption reqd are:
0 – Allows the client to choose the encryption algorithm used for login passwords on the network, including no password encryption. This is the default value for this configuration parameter and provides functionality most similar to earlier releases. This allows the choice of network password encryption to be established by the client application.
1 – Restricts clients to use either RSA or Sybase proprietary encryption algorithms to encrypt login passwords on the network. This provides an incrementally restrictive setting that allows older clients to connect with the Sybase proprietary algorithm and new clients to connect with the stronger RSA algorithm. A client that attempts to connect without using password encryption fails.
2 – Restricts clients to use only the RSA encryption algorithms to encrypt login passwords on the network. This provides strong RSA encryption of passwords and requires use of newer clients. A client that attempts to connect without using the RSA encryption fails.
When enabled, Omni connects to the specified server using the CS_LOGIN_TYPE connection property, with type set to LREMUSER. Also, if the remote server is an SAP ASE server, the CS_LOGIN_REMOTE_SERVER property is set to the value of the local server name, and remote passwords are set using ct_remote_pwd().
When enabled, Omni connects to the specified server using the CS_SEC_CHALLENGE property, and establishes a callback handler that can respond appropriately to login challenges from XP Server and Backup Server.
The SAP ASE server accepts any unique string that is part of the option name. Use quotes around the option name if it includes embedded blanks.
select * from syssecmechs
sp_serveroption
Settable server options. ------------------------ cis hafailover enable login redirection external engine auto start incompatible sort order mutual authentication negotiated logins net password encryption readonly relocated joins security mechanism server cost server logins server principal timeouts use message confidentiality use message integrity
sp_serveroption GATEWAY, "timeouts", false
sp_serveroption GATEWAY, "net password encryption", true
sp_serveroption SYB_EJB, "external engine auto start", true
sp_serveroption S2, "security mechanism", csfkrb5
sp_serveroption TEST3, "mutual authentication", true
sp_serveroption 'SYB_EJB', 'external engine auto start', 'false'
sp_serveroption 'SYB_EJB', 'external engine auto start', 'true'
See the EJB Server User’s Guide for more information about using external engine auto start.
To display a list of server options that can be set by the user, use sp_serveroption with no parameters.
Once timeouts is set to false, the site handlers continue to run until one of the two servers is shut down.
The net password encryption option allows clients to specify whether to send passwords in plain text or encrypted form over the network when initiating a remote procedure call. If net password encryption is true, the initial login packet is sent without passwords, and the client indicates to the remote server that encryption is desired. The remote server sends back an encryption key, which the client uses to encrypt its passwords. The client then encrypts its passwords, and the remote server uses the key to authenticate them when they arrive.
To set network password encryption for a particular isql session, you can use a command line option for isql.
The security mechanism, mutual authentication, use message confidentiality, and use message integrity options apply to Kerberos logins only.
See the System Administration Guide for more information on server options.
isql in the Utility Guide
The permission checks for sp_serveroption differ based on your granular permissions settings.
Setting | Description |
---|---|
Enabled | With granular permissions enabled, you must be a user with manage server privilege. For a shared-disk cluster, you must be a user with manage server and manage cluster privileges. Any user can execute sp_serveroption with no parameters to display a list of options. |
Disabled | With granular permissions disabled, you must be a user with sa_role to set the timeouts option. You must be a user with sso_role to set:
Any user can execute sp_serveroption with no parameters to display a list of options. |
Values in event and extrainfo columns from the sysaudits table are:
Information | Values |
---|---|
Event | 38 |
Audit option | exec_procedure |
Command or access audited | Execution of a procedure |
Information in extrainfo |
|