What Is the Process for Configuring Database User Authentication?

The process for configuring database user authentication is outlined in the following table. Some of these steps are performed once per Environment, while some must be performed for each user who will access the database.

Step Description
1

Using the tools provided by the database vendor, create the database user(s) in the database.

When using the USE_USER_ID method of access, repeat this step any time you add a user to the system who will access the database.

When using the USE_PRIVILEGED_ID, only repeat this step if you want to change the user who accesses the database.

2

Create the Landmark users who will access the database.

Use secadm to create and configure the Landmark identities and actors who will access the database.

For more information, see Configuring Identities and Actors for the USE_USER_ID Method, and Creating an Actor Using the secadm Utility.

3

Create the login scheme for the database user(s).

The login scheme will be either USE_USER_ID or USE_PRIVILEGED_ID. Creating the Database Login Scheme and Service

Note: 

If you are using the db.cfg file to specify the database user, you do not need to configure a login scheme for the database service.

4 Create and configure the database service, and assign the login scheme to the database service. Creating the Database Login Scheme and Service
5

Assign the database actor and identity to the database service. Configuring Identities and Actors for the USE_USER_ID Method

– or –

Assign the privileged user identity to the database service. Configuring Identities and Actors for the USE_PRIVILEGED_ID Method

6 Configure the data area to use the database service. Configuring the Data Area for the Database Access Method