Jump to main content
HCL Logo Product Documentation
Customer Support Community
Customer Support HCLSoftware U Community Forums Customer Idea Portal
HCL Informix V15.0.0
  1. Home icon
  2. Welcome
  3. Security

    You can secure your Informix® database server and the data that is stored in your Informix databases. You can encrypt data, secure connections, control user privileges and access, and audit data security.

  4. Security in HCL Informix®

    The HCL® Informix® Security Guide documents methods for keeping your data secure by preventing unauthorized viewing and altering of data or database objects, including how to use the secure-auditing facility of the database server.

  5. Securing data
  6. Connection security

    You can administer the security of the connections to the database server by using authentication and authorization processes.

  7. Authentication module deployment

Product logo

  • HCL Informix® V15.0.0 documentation

    Welcome to the documentation for HCL Informix® 15.0.0 and related client tools and products.

  • Product overview

    HCL Informix® is a fast and scalable database server that manages traditional relational, object-relational, and dimensional databases. Its small footprint and self-managing capabilities are suited to embedded data-management solutions.

  • Installing

    These topics describe how to install HCL Informix® database servers, client products, and modules.

  • Administering

    In addition to administering the database server, you can tune performance, replicate data, and archive data.

  • Migrating and upgrading

    You can upgrade to the 15.0.0 release of HCL Informix® or migrate from other database servers to Informix. Upgrading is an in-place migration method that uses your existing hardware and operating system software. Some changes to the Informix database server can affect upgrading from a previous release.

  • Client APIs and tools

    You can use the HCL Informix® implementation of client APIs to develop applications for Informix database servers.

  • Embedding Informix®

    When you embed HCL Informix®, you can use enterprise-class high-availability and high performance with embeddability features such as easy programmability, a small disk and memory footprint, and silent deployment.

  • Extending Informix®

    Beyond standard relational database objects, HCL Informix® can be extended to handle specialized data types, access methods, routines, and other objects. Informix includes many built-in extensions that are fully integrated in the database server. Informix also provides modules, which are packages of extended database objects for a particular purpose and that are installed separately from the database server. Alternatively, you can create your own user-defined objects for Informix.

  • Data warehousing

    In addition to designing and implementing Informix® dimensional databases, you can use tools to create data warehouse applications and optimize your data warehouse queries.

  • Designing databases

    The first step in creating a relational database is to construct a data model, which is a precise, complete definition of the data you want to store. After you prepare your data model, you must implement it as a database and tables. To implement your data model, you first select a data type for each column and then you create a database and tables and populate the tables with data. You can also implement fragmentation strategies and control access to your data.

  • JSON compatibility

    You can use the popular JSON-oriented query language created by MongoDB to interact with data stored in HCL Informix®.

  • Security

    You can secure your Informix® database server and the data that is stored in your Informix databases. You can encrypt data, secure connections, control user privileges and access, and audit data security.

    • Security in HCL Informix®

      The HCL® Informix® Security Guide documents methods for keeping your data secure by preventing unauthorized viewing and altering of data or database objects, including how to use the secure-auditing facility of the database server.

      • Securing data
        • HCL Informix® directory security

          utilities and product directories are secure by default.

        • Network data encryption

          Use network encryption to encrypt data transmitted between server and client, and between server and other server.

        • Column-level encryption

          You can use column-level encryption to store sensitive data in an encrypted format. After encrypting sensitive data, such as credit card numbers, only users who can provide a secret password can decrypt the data.

        • Connection security

          You can administer the security of the connections to the database server by using authentication and authorization processes.

          • Authentication mechanisms

            You can configure the Informix® server authentication mechanisms to meet varying requirements, such as different security methods required for local and remote connections, database access by users without operating system accounts on the servers host computer, and non-root installation.

          • Internal users (UNIX™, Linux™)

            The DBSA can grant database access to users that do not authenticate on the OS of the host computer by mapping PAM-authenticated users to OS-level entities or by configuring the server to perform internal authentication.

          • Guest account (Windows™)

            Disable the Windows™ Guest account to prevent anonymous logins.

          • Trusted-context objects and trusted connections

            You can use trusted-context objects and trusted connections to increase system performance and security within a three-tier application model.

          • Pluggable authentication modules (UNIX™ or Linux™)

            A Pluggable Authentication Module (PAM) is a well-defined framework for supporting different authentication modules that were originally developed by Sun Microsystems. PAM is supported in both 32- and 64-bit modes on Solaris, Linux™, HP-UX and AIX®.

          • LDAP authentication support on Windows™

          • Authentication module deployment

            • Implicit connections with authentication modules

              Authentication responses to authentication modules, such as PAM and LDAP, expect a password. However, in implicit connections to the database server, there is no password.

            • Application development for authentication modules

              The authentication method depends on the PAM or LDAP Authentication Support module installed.

            • Distributed transactions and authentication modules

              When initiates a distributed connection after the session is established, it cannot respond to authentication challenges because the timing is unpredictable. Also, the password required to connect to the local server might not be the same as the password required to connect to the remote server. Consequently, authentication for distributed connections must be completed by the remote server on the basis of trust. The remote server must trust the local server and the remote administrators must explicitly permit the user to connect from the local server to the remote server.

            • Client APIs and authentication support modules

              Only specific HCL Informix® client APIs support PAM and LDAP Authentication Support modules. To use the other APIs when an authentication module is enabled on HCL® Informix, you can connect to a DBSERVERALIASES.

            • Compatibility issues with authentication modules

              Only specific HCL Informix® products support authentication modules. To use the other products when an authentication module is enabled on HCL® Informix, you can connect to a DBSERVERALIASES.

          • Simple password encryption

            The simple password communication support module (SPWDCSM) provides password encryption.

          • Single sign-on

            Single sign-on is an authentication feature that bypasses the requirement to provide user name and password after a user logs into the client computer's operating system.

          • Securing local connections to a host

            The database server administrator (DBSA) can use the SECURITY_LOCALCONNECTION configuration parameter to set up security checking for local connections with the same host.

          • Limiting denial-of-service flood attacks

            HCL® Informix® has multiple listener threads (listen_authenticate) to limit denial-of-service (DOS) attacks.

        • Discretionary access control

          Discretionary access control verifies whether the user who is attempting to perform an operation has been granted the required privileges to perform that operation.

        • Label-Based Access Control

          You can use label-based access control (LBAC), an implementation of multi-level security (MLS), to control who has read access and who has write access to individual rows and columns of data.

      • Auditing data security
  • SQL programming

    You can use the HCL Informix® implementation of the SQL language to develop applications for Informix database servers.

  • Troubleshooting HCL Informix®

    Several troubleshooting techniques, tools, and resources are available for resolving problems that you encounter in your HCL Informix® database server environment.

 Feedback

Authentication module deployment

When you use authentication modules, you must consider the following issues:

  • Implicit connections with authentication modules
  • Application development for authentication modules
  • Distributed transactions and authentication modules
  • Client APIs and authentication support modules
  • Compatibility issues with authentication modules
  • Implicit connections with authentication modules
    Authentication responses to authentication modules, such as PAM and LDAP, expect a password. However, in implicit connections to the database server, there is no password.
  • Application development for authentication modules
    The authentication method depends on the PAM or LDAP Authentication Support module installed.
  • Distributed transactions and authentication modules
    When initiates a distributed connection after the session is established, it cannot respond to authentication challenges because the timing is unpredictable. Also, the password required to connect to the local server might not be the same as the password required to connect to the remote server. Consequently, authentication for distributed connections must be completed by the remote server on the basis of trust. The remote server must trust the local server and the remote administrators must explicitly permit the user to connect from the local server to the remote server.
  • Client APIs and authentication support modules
    Only specific HCL Informix® client APIs support PAM and LDAP Authentication Support modules. To use the other APIs when an authentication module is enabled on HCL® Informix®, you can connect to a DBSERVERALIASES.
  • Compatibility issues with authentication modules
    Only specific HCL Informix® products support authentication modules. To use the other products when an authentication module is enabled on HCL® Informix®, you can connect to a DBSERVERALIASES.
  • Share: Email
  • Twitter
  • Disclaimer
  • Privacy
  • Terms of use
  • Cookie Preferences