Define a Db2 z/OS Trusted Context
Use the Trusted Context editor to specify parameters for this Db2 object. A Trusted Context enables you to establish a trusted relationship between a Db2 DBMS and an external entity.
This topic applies to Db2 for z/OS version 9.1 only.
To define a Db2 z/OS Trusted Context
- Right-click a Trusted Context in the Model Explorer and select Properties.
The Db2 z/OS Trusted Context editor opens.
- Select a trusted context name and work with the following options:
Click New
on the toolbar to create a trusted context. Use the Enter filtertext text box to filter a large list of trusted contexts to locate the one you want to work with.
- Name
Specifies the name of the trusted context.
- Enabled
Specifies that the trusted context is enabled.
- Authorization ID
Specifies the Authorization ID to use for the Trusted Context. DBC and PUBLIC are provided. You can open the User Id Editor from the provided link to create or revise a User ID.
- Generate
Specifies whether or not to generate DDL for this object during Forward Engineering.
- Work with the following options on the General tab:
- Default Role
Specifies that the selected role name is the role for the trusted context.
- Is Role Used for Object Ownership
Specifies whether or not the role is the owner of the objects created using a trusted connection that is based on the trusted context.
- Default Security Label
Specifies the default security label for the trusted context; in addition, specifies that the security label is used for multilevel security verification.
- Click the Trusted Context Attributes tab and work with the following options:
- Name
Specifies the names of attributes that are used to define the trusted context.
- Attribute Type
Specifies the type of attribute that defines the trusted context. Select from the drop-down list; valid values are, Address, Server Authorization, Jobname, and Encryption.
- Value
Specifies the value of the attribute. This field appears if you have selected Address, Server Authorization, or Jobname for the Attribute Type field.
- Encryption Type
Specifies the minimum level of encryption for the trusted context. Select from the drop-down list; valid values are, None, Low, and High.
- Click the Trusted Context Users tab and work with the following options:
- Name
Specifies the user who can use a trusted connection that is based on the trusted context.
- User Type
Specifies the type of user that uses the trusted connection that is based on the trusted context. Select from the drop-down list; valid values are, Authorization Name, External Security Profile, and Public.
- Authorization ID
Specifies the authorization ID for the selected Authorization Name to access a trusted connection that is based on the trusted context. Select from the drop-down list.
- Profile Name
Specifies the profile name that the primary authorization ID can use to use the trusted connection.
- Database Role
Specifies the role of the selected user that uses the trusted connection using the trusted context.
- Security Label
Specifies the security label to use for multilevel security verification when the trusted connection is used by the specified authorization-name.
- Is Authenticated
Specifies whether the user that uses the trusted connection has to be authenticated.
- (Optional) Click the Comment tab and enter any comments that you want to associate with the object.
- (Optional) Click the UDP tab to work with user-defined properties for the object.
- (Optional) Click the Notes tab to view and edit user notes.
- Click Close.
The Db2 for z/OS Trusted Context Editor closes.
Copyright © 2025 Quest Software, Inc. |