Download Integration Through Data Federation

Transcript
user ID naming convention also indicates whether the user has been authorized
in the remote source as a database administrator (DBA) or as an end user. In our
case study, the end user specific to that database identifier has been specifically
granted SELECT access to the tables at that remote data source. Authorizations
to PUBLIC have not been used. This approach has allowed us to investigate
exactly what the security and authentication requirements are when using each
of the federated technologies.
Table 2-2 shows the user IDs used for creating tables and those users authorized
to access tables in each of the data sources.
Table 2-2 User IDs used in each of the data sources
Region
DBMS
Server
Database
identifier
DBA
user ID
End
user
Region 1
IDS
linsvr
ifxl
ifxdbal
ifxusrl
Region 2
IDS
winsvr
ifxw
ifxdbaw
ifxusrw
Region 3
Oracle9i
winsvr
oraw
oradbaw
orausrw
Region 4
Informix XPS
linsvr
xpsl
xpsdbal
xpsusrl
Region 5
DB2
winsvr
db2w
db2dbaw
db2usrl
Region 6
Red Brick
linsvr
rbwl
rbwdbal
rbwusrl
Region 7
DB2
linsvr
db2l
db2dbal
db2usrl
The user ID used to run the queries for our case study was the local end user for
the relevant federated database. So for DB2 II, the end user db2dbaw was used.
When running the same queries through the Informix federated database, the
user ifxusrl was used.
46
IBM Informix: Integration Through Data Federation