Table of Contents

Search

  1. Preface
  2. Introduction to PowerExchange Bulk Data Movement
  3. PowerExchange Listener
  4. Adabas Bulk Data Movement
  5. Datacom Bulk Data Movement
  6. DB2 for i5/OS Bulk Data Movement
  7. DB2 for Linux, UNIX, and Windows Bulk Data Movement
  8. DB2 for z/OS Bulk Data Movement
  9. IDMS Bulk Data Movement
  10. IMS Bulk Data Movement
  11. Microsoft SQL Server Bulk Data Movement
  12. Oracle Bulk Data Movement
  13. Sequential File Bulk Data Movement
  14. VSAM Bulk Data Movement
  15. Writing Data with Fault Tolerance
  16. Monitoring and Tuning Options

Bulk Data Movement Guide

Bulk Data Movement Guide

Bulk Data Movement Security

Bulk Data Movement Security

A PowerExchange user must have the proper level of authority to connect to the PowerExchange Listener and to access the PowerExchange resources and the data sources and targets.
On z/OS and i5/OS systems, you can include the SECURITY statement in the DBMOVER configuration member to require a user ID and password from an attached client for access to PowerExchange resources and data sources and targets.
On supported Linux, UNIX, and Windows systems, you can include the SECURITY statement along with related statements in the DBMOVER configuration member to require LDAP authentication to verify the credentials of a client that is trying to connect to the PowerExchange Listener or PowerExchange Logger.
On z/OS, the following additional levels of security are available, depending the type of data source or target:
  • For DB2 for z/OS data, you can include the MVSDB2AF statement in the DBMOVER configuration member to control whether PowerExchange uses the call attachment facility (CAF) or Recovery Resource Services attachment facility (RRSAF) to connect to DB2. To use DB2 authentication methods to control user access to DB2 tables, select RRSAF. To use the PowerExchange Listener user ID to verify user access, select CAF.
  • For Datacom data, you can define RACF resource profiles to prevent unauthorized READ access to Datacom tables.
  • For Adabas data, you can use any of the following security methods:
    • Adabas password security at the file level
    • Adabas Security by Value method
    • RACF resource profiles to restrict WRITE access to Adabas databases and files
For more information about security, see the
PowerExchange Reference Manual
.

0 COMMENTS

We’d like to hear from you!