27.12.2012 Views

International Technical Support Organization Database Systems ...

International Technical Support Organization Database Systems ...

International Technical Support Organization Database Systems ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

But when the request is a Copy Data that involves two hosts, it is more difficult<br />

to figure out which DataHub/2 user profile entry will be sent along with the<br />

request. Figure 174 on page 247 will help you understand which host will get<br />

the DataHub/2 request and, by the same logic, which DataHub/2 user profile<br />

entry will be sent with the request. The complexity is caused by the fact that the<br />

OS/2 <strong>Database</strong> Manager can only be a requester in a DRDA network. When a<br />

Copy Data function is requested that involves one OS/2 <strong>Database</strong> Manager<br />

database and one DRDA server RDBMS, the request will always be sent to the<br />

DataHub <strong>Support</strong>/2 component, which will process the request.<br />

Because the security information sent with the Copy Data request is used for<br />

both conversation security validation on the target host and the Copy Data<br />

function itself, in order to succeed, the Copy Data function requires that the<br />

security information be the same on both the source and the target RDBMS.<br />

Figure 174. DH/2: User Profile Entry Selection Diagram<br />

Chapter 7. Security Considerations 247

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!