Deploying a group retrieval plug-in
To customize the DB2 security system's
group retrieval behavior, you can develop your own group retrieval
plug-in or buy one from a third party.
Deploying a user ID/password plug-in
To customize the DB2 security system's
user ID/password authentication behavior, you can develop your own
user ID/password authentication plug-ins or buy one from a third party.
Deploying a GSS-API plug-in
To customize the DB2 security
system's authentication behavior, you can develop your own authentication
plug-ins using the GSS-API, or buy one from a third party.
Deploying a Kerberos plug-in
To customize the Kerberos authentication behavior of the DB2 security system, you can develop
your own Kerberos authentication plug-ins or purchase one from a third
party.