Trusted-context objects and trusted connections

You can use trusted-context objects and trusted connections to increase system performance and security within a three-tier application model.

Trusted connections are established through a trusted-context database object, which must be created and defined by a user who holds the DBSECADM role. Trusted-context objects can contain:
  • Attributes for defining a trusted connection
  • Authentication requirements for trusted-connection users
  • Roles for defining the access privileges of trusted-connection users

If a trusted-connection request matches all of a trusted-context object's attributes, the system grants a trusted connection. If a connection request contains an attribute that does not match the trusted-context object, the system rejects the request.

If you are a Database Administrator, and users are accessing your database through a middle-tier server, you can use trusted-context objects to:
  • Increase system security
  • Increase overall system performance
  • Reduce maintenance overhead
  • Control user privileges
  • Preserve auditing capability of user access
If you are an Application Developer, and you are accessing a database through a middle-tier server, you can use trusted connections to:
  • Maintain your user ID when you access a database server
  • Share a single database connection with other users
  • Increases overall system performance