SYSIBM.IPNAMES table

The SYSIBM.IPNAMES table defines the remote DRDA servers DB2® can access using TCP/IP.

Rows in this table can be inserted, updated, and deleted.

Column name Data type Description Use
LINKNAME
VARCHAR(24)
NOT NULL
The value specified in this column must match the value specified in the LINKNAME column of the associated row in SYSIBM.LOCATIONS. G
SECURITY_OUT
CHAR(1)
NOT NULL
WITH DEFAULT 'A'
This column defines the DRDA security option that is used when local DB2 SQL applications connect to any remote server associated with this TCP/IP host:
A
The option is "already verified". Outbound connection requests contain an authorization ID and no password. The authorization ID used for an outbound request is either the DB2 user's authorization ID or a translated ID, depending upon the value of the USERNAMES column.

The authorization ID is not encrypted when it is sent to the partner. For encryption, refer to 'D'.

D
The option is "userid and security-sensitive data encryption". Outbound connection requests contain an authorization ID and no password. The authorization ID used for an outbound request is either the DB2 user's authorization ID or a translated ID, depending upon the value of the USERNAMES column.

This option indicates that the userid and security-sensitive data are to be encrypted. For non-encryption, refer to 'A'.

E
The option is "userid, password, and security-sensitive data encryption". Outbound connection requests contain an authorization ID and a password. The password is obtained from the SYSIBM.USERNAMES table. The USERNAMES column must specify 'O'.

This option indicates that the userid, password, and security-sensitive data are to be encrypted. For non-security-sensitive data encryption, refer to 'P'.

If the applications connect to any remote server as trusted, the USERNAMES column must specify 'O' or 'S'.

G
SECURITY_OUT (continued)  
P
The option is "password". Outbound connection requests contain an authorization ID and a password. The password is obtained from the SYSIBM.USERNAMES table. The USERNAMES column must specify 'O'.

This option indicates that the userid and the password are to be encrypted if cryptographic services are available at the requester and if the server supports encryption. Otherwise, the userid and the password are sent to the partner in clear text. For security-sensitive data encryption, see 'E'.

If the applications connect to any remote server as trusted, the USERNAMES column must specify 'O' or 'S'.

R
The option is "RACF® PassTicket". Outbound connection requests contain a userid and a RACF PassTicket. The value specified in the LINKNAME column is used as the RACF PassTicket application name for the remote server.

The authorization ID used for an outbound request is either the DB2 user's authorization ID or a translated ID, depending upon the value of the USERNAMES column.

The authorization ID is not encrypted when it is sent to the partner.

 
USERNAMES
CHAR(1)
NOT NULL WITH
DEFAULT
This column controls outbound authorization ID translation. Outbound translation is performed when an authorization ID is sent by DB2 to a remote server.
O
An outbound ID is subject to translation. Rows in the SYSIBM.USERNAMES table are used to perform ID translation.

No translation or "come from" checking is performed on inbound IDs.

S
Row in the SYSIBM.USERNAMES table is used to obtain the system AUTHID used to establish a trusted connection.
blank
No translation occurs.
G
IBMREQD
CHAR(1)
NOT NULL WITH
DEFAULT 'N'
A value of Y indicates that the row came from the basic machine-readable material (MRM) tape. For all other values, see Release dependency indicators.

The value in this field is not a reliable indicator of release dependencies.

G
IPADDR
VARCHAR(254)
NOT NULL WITH
DEFAULT

This column contains an IPv4 or IPv6 address, or domain name of a remote TCP/IP host. The IPADDR column must be specified as follows:

  • An IPv4 address must be left justified and is represented as a dotted decimal address. For example, '123.456.78.91' would be interpreted as an IPv4 address.
  • An IPv6 address must be left justified and is represented as a colon hexadecimal address. An example of an IPv6 address is '2001:0DB8:0000:0000:0008:0800:200C:417A', which can also be expressed in compressed form as '2001:DB8::8:800:200C:417A'.
  • A domain name is converted to an IP address by the domain name server where a resulting IPv4 or IPv6 address is determined. An example of a domain name is 'stlmvs1.svl.ibm.com'.
G