Trusted-context objects and trusted connections
You can use trusted-context objects and trusted connections to increase system performance and security within a three-tier application model.
Trusted connections are established through a trusted-context database
object, which must be created and defined by a user who holds the
DBSECADM role. Trusted-context objects can contain:
- Attributes for defining a trusted connection
- Authentication requirements for trusted-connection users
- Roles for defining the access privileges of trusted-connection users
If a trusted-connection request matches all of a trusted-context object's attributes, the system grants a trusted connection. If a connection request contains an attribute that does not match the trusted-context object, the system rejects the request.
If you are a Database Administrator, and users are accessing your
database through a middle-tier server, you can use trusted-context
objects to:
- Increase system security
- Increase overall system performance
- Reduce maintenance overhead
- Control user privileges
- Preserve auditing capability of user access
If you are an Application Developer, and you are accessing a database
through a middle-tier server, you can use trusted connections to:
- Maintain your user ID when you access a database server
- Share a single database connection with other users
- Increases overall system performance