SlideShare a Scribd company logo
Top 10 DB2 SupportTop 10 DB2 SupportTop 10 DB2 SupportTop 10 DB2 Support
Nightmares & How toNightmares & How toNightmares & How toNightmares & How to
Avoid ThemAvoid ThemAvoid ThemAvoid Them
#10#10#10#10
Part 10 – Beware of over-federating
The situation
Image of a junior DBA
During a DB2-LDAP configuration at a client
site we stumbled upon a bizarre security
exposure……
Using any DB2 client tool, it was possible to
connect to the database as any user without
having to get the password right! Once
connected to the database, you only had
access to the tables that the user had access to.
However, this meant if anyone got the right
username for the DB2 instance owner then
they could select/add/delete any data they
liked!
Image of a junior DBA
In short, they had SYSADM authority which could potentially lead to a major security
exposure.
SECURITY BREACH!
How did it happen?
In a desperate attempt to get federated technology to
work, in addition to enabling the FEDERATED database
manager parameter, the FED_NOAUTH (bypass
federated authentication) parameter had also been
enabled (set to YES). This was the problem.
When FED_NOAUTH is set to YES, FEDERATED is set to
YES and authentication is set to SERVER or
SERVER_ENCRYPT, then authentication at the instance
is bypassed. It is assumed that authentication will
happen at the data source.
The Moral
The moral of the story
You do NOT need FED_NOAUTH enabled
to implement federation in DB2!
If in doubt, call the experts!
www.triton.co.uk

More Related Content

PDF
Top 10 DB2 Support Nightmares #7
PDF
Top 10 DB2 Support Nightmares #8
PDF
Top 10 DB2 Support Nightmares #1
PPTX
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
PDF
10 cool features in defrag 10
PPTX
Windows 7 client performance talk - Jeff Stokes
PPTX
Database Maintenance Optimization Brad Mc Gehee
PDF
Start Counting: How We Unlocked Platform Efficiency and Reliability While Sav...
Top 10 DB2 Support Nightmares #7
Top 10 DB2 Support Nightmares #8
Top 10 DB2 Support Nightmares #1
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
10 cool features in defrag 10
Windows 7 client performance talk - Jeff Stokes
Database Maintenance Optimization Brad Mc Gehee
Start Counting: How We Unlocked Platform Efficiency and Reliability While Sav...

Similar to Top 10 DB2 Support Nightmares #10 (20)

PDF
IOD 2012 IDZ-2418A Nationwide's Experince Deploying Trusted Context and Roles
PDF
Db2.security.slides
PDF
Top 10 DB2 Support Nightmares #1
PDF
Db2exc guide 952_mac_x86_64
KEY
Administration for Oracle ADF Applications
KEY
Administration von ADF Anwendungen
PPTX
Db2 v10.5 An Overview
PPT
2) security
PPTX
Real World Experience: Integrating DB2 with XPages
DOCX
how to protect your sensitive data using oracle database vault
DOCX
Db2 v9 dba for linux taining in bangalore
PDF
vRealize Operations (vROps) Management Pack for IBM DB2 Overview
PPT
Deploying MediaWiki On IBM DB2 in The Cloud Presentation
PPTX
Fall of a domain | From local admin to Domain user hashes
PPTX
Enterprise resource planning system & web enabled databases
PPTX
Unit 1_intro_dbms.pptx
PDF
Case Project 12-2 Devising an AD DS Design with RODC, AD RMS, and A.pdf
PPTX
S3 l3 db2 environment - instances
PDF
Ibm db2 10.5 for linux, unix, and windows db2 connect installing and config...
PDF
NA14G05 - A DB2 DBAs Guide to pureScale.pdf
IOD 2012 IDZ-2418A Nationwide's Experince Deploying Trusted Context and Roles
Db2.security.slides
Top 10 DB2 Support Nightmares #1
Db2exc guide 952_mac_x86_64
Administration for Oracle ADF Applications
Administration von ADF Anwendungen
Db2 v10.5 An Overview
2) security
Real World Experience: Integrating DB2 with XPages
how to protect your sensitive data using oracle database vault
Db2 v9 dba for linux taining in bangalore
vRealize Operations (vROps) Management Pack for IBM DB2 Overview
Deploying MediaWiki On IBM DB2 in The Cloud Presentation
Fall of a domain | From local admin to Domain user hashes
Enterprise resource planning system & web enabled databases
Unit 1_intro_dbms.pptx
Case Project 12-2 Devising an AD DS Design with RODC, AD RMS, and A.pdf
S3 l3 db2 environment - instances
Ibm db2 10.5 for linux, unix, and windows db2 connect installing and config...
NA14G05 - A DB2 DBAs Guide to pureScale.pdf
Ad

More from Laura Hood (20)

PDF
Top 10 DB2 Support Nightmares #9
PDF
Top 10 db2 support nightmares #6
PDF
Consultancy on Demand - Infographic
PDF
A Time Traveller's Guide to DB2: Technology Themes for 2014 and Beyond
PDF
Db2 10 memory management uk db2 user group june 2013 [read-only]
PDF
DB2 10 Security Enhancements
PDF
DbB 10 Webcast #3 The Secrets Of Scalability
PDF
DB2 10 Webcast #2 - Justifying The Upgrade
PDF
DB2 10 Webcast #1 - Overview And Migration Planning
PDF
Time Travelling With DB2 10 For zOS
PDF
DB2DART - DB2Night Show October 2011
PDF
DB2 z/OS & Java - What\'s New?
PDF
Temporal And Other DB2 10 For Z Os Highlights
PDF
DB210 Smarter Database IBM Tech Forum 2011
PDF
UKGSE DB2 pureScale
PPTX
UKCMG DB2 pureScale
PDF
Episode 4 DB2 pureScale Performance Webinar Oct 2010
PDF
Episode 3 DB2 pureScale Availability And Recovery [Read Only] [Compatibility...
PDF
Episode 2 Installation Triton Slides
PDF
Episode 2 DB2 pureScale Installation, Instance Management & Monitoring
Top 10 DB2 Support Nightmares #9
Top 10 db2 support nightmares #6
Consultancy on Demand - Infographic
A Time Traveller's Guide to DB2: Technology Themes for 2014 and Beyond
Db2 10 memory management uk db2 user group june 2013 [read-only]
DB2 10 Security Enhancements
DbB 10 Webcast #3 The Secrets Of Scalability
DB2 10 Webcast #2 - Justifying The Upgrade
DB2 10 Webcast #1 - Overview And Migration Planning
Time Travelling With DB2 10 For zOS
DB2DART - DB2Night Show October 2011
DB2 z/OS & Java - What\'s New?
Temporal And Other DB2 10 For Z Os Highlights
DB210 Smarter Database IBM Tech Forum 2011
UKGSE DB2 pureScale
UKCMG DB2 pureScale
Episode 4 DB2 pureScale Performance Webinar Oct 2010
Episode 3 DB2 pureScale Availability And Recovery [Read Only] [Compatibility...
Episode 2 Installation Triton Slides
Episode 2 DB2 pureScale Installation, Instance Management & Monitoring
Ad

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Cloud computing and distributed systems.
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Modernizing your data center with Dell and AMD
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Review of recent advances in non-invasive hemoglobin estimation
The AUB Centre for AI in Media Proposal.docx
Modernizing your data center with Dell and AMD
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf

Top 10 DB2 Support Nightmares #10

  • 1. Top 10 DB2 SupportTop 10 DB2 SupportTop 10 DB2 SupportTop 10 DB2 Support Nightmares & How toNightmares & How toNightmares & How toNightmares & How to Avoid ThemAvoid ThemAvoid ThemAvoid Them #10#10#10#10
  • 2. Part 10 – Beware of over-federating The situation Image of a junior DBA During a DB2-LDAP configuration at a client site we stumbled upon a bizarre security exposure……
  • 3. Using any DB2 client tool, it was possible to connect to the database as any user without having to get the password right! Once connected to the database, you only had access to the tables that the user had access to. However, this meant if anyone got the right username for the DB2 instance owner then they could select/add/delete any data they liked!
  • 4. Image of a junior DBA In short, they had SYSADM authority which could potentially lead to a major security exposure. SECURITY BREACH!
  • 5. How did it happen? In a desperate attempt to get federated technology to work, in addition to enabling the FEDERATED database manager parameter, the FED_NOAUTH (bypass federated authentication) parameter had also been enabled (set to YES). This was the problem. When FED_NOAUTH is set to YES, FEDERATED is set to YES and authentication is set to SERVER or SERVER_ENCRYPT, then authentication at the instance is bypassed. It is assumed that authentication will happen at the data source. The Moral
  • 6. The moral of the story You do NOT need FED_NOAUTH enabled to implement federation in DB2!
  • 7. If in doubt, call the experts!