Ingres 10.1 Connectivity Guide

Ingres 10.1 Connectivity Guide

Ingres 10S Connectivity Guide ING-101-CN-05 This Documentation is for the end user's informational purposes only and may be subject to change or withdrawal by Actian Corporation ("Actian") at any time. This Documentation is the proprietary information of Actian and is protected by the copyright laws of the United States and international treaties. It is not distributed under a GPL license. You may make printed or electronic copies of this Documentation provided that such copies are for your own internal use and all Actian copyright notices and legends are affixed to each reproduced copy. You may publish or distribute this document, in whole or in part, so long as the document remains unchanged and is disseminated with the applicable Actian software. Any such publication or distribution must be in the same manner and medium as that used by Actian, e.g., electronic download via website with the software or on a CD- ROM. Any other use, such as any dissemination of printed copies or use of this documentation, in whole or in part, in another publication, requires the prior written consent from an authorized representative of Actian. To the extent permitted by applicable law, ACTIAN PROVIDES THIS DOCUMENTATION "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IN NO EVENT WILL ACTIAN BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USER OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF ACTIAN IS EXPRESSLY ADVISED OF SUCH LOSS OR DAMAGE. The manufacturer of this Documentation is Actian Corporation. For government users, the Documentation is delivered with "Restricted Rights" as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.227-19(c)(1) and (2) or DFARS Section 252.227-7013 or applicable successor provisions. Copyright © 2012 Actian Corporation. All Rights Reserved. Actian, Cloud Action Platform, Cloud Action Server, Action Server, Ingres, Vectorwise, OpenROAD, Enterprise Access, and EDBC are trademarks or registered trademarks of Actian Corporation. All other trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Contents Chapter 1: Introducing Ingres Connectivity 13 In This Guide ...................................................................................................................... 13 Connectivity Solutions Not in This Guide ................................................................................. 14 Basic Networking Concepts ................................................................................................... 15 Ingres Components and Tools ............................................................................................... 16 Ingres Instance ............................................................................................................. 17 System-specific Text in This Guide ......................................................................................... 18 Terminology Used in This Guide ............................................................................................ 19 Syntax Conventions Used in This Guide .................................................................................. 19 Chapter 2: Exploring Net 21 Ingres Net ......................................................................................................................... 21 General Communication Facility ....................................................................................... 22 Net Security ................................................................................................................. 23 Installation Configurations That Require Net............................................................................ 24 Net and Other Ingres-related Products ................................................................................... 24 Net and Enterprise Access and EDBC Products ................................................................... 25 Net and Ingres Star ....................................................................................................... 25 Net Product Integration Summary .................................................................................... 26 Benefits of Net .................................................................................................................... 27 Net Concepts ...................................................................................................................... 28 Virtual Nodes ................................................................................................................ 28 Connection Data ............................................................................................................ 29 Remote User Authorizations ............................................................................................ 30 Global and Private Definitions .......................................................................................... 31 Net Management Tools ........................................................................................................ 32 Net and Bridge Users ........................................................................................................... 33 System Administrator and Ingres Net ............................................................................... 34 Database Administrator and Ingres Net ............................................................................. 34 End Users and Ingres Net ............................................................................................... 34 GCA Privileges .................................................................................................................... 35 Chapter 3: Installing and Configuring Net 37 Net Installation Components ................................................................................................. 37 How You Prepare for Installation ........................................................................................... 37 Network Installation and Testing ...................................................................................... 38 Setup Parameters for Net ............................................................................................... 41 Contents iii How Net Setup Works on an Existing Installation ..................................................................... 43 How Communications Are Enabled ......................................................................................... 43 How You Install Net ............................................................................................................. 43 ingvalidpw Program ....................................................................................................... 45 Create Password Validation Program (UNIX) ...................................................................... 45 Net Configuration Parameters—Customize Ingres Net ............................................................... 46 Chapter 4: Establishing Communications 49 How User Access Is Established ............................................................................................. 49 Requirements for Accessing Remote Instances ................................................................... 49 Requirements for Accessing Distributed Databases ............................................................. 50 Tools for Defining Vnodes ..................................................................................................... 51 Netutil (Net Management Utility) ........................................................................................... 52 Netutil Startup Screen .................................................................................................... 53 Virtual Node Name Table in Netutil ................................................................................... 53 Login and Password Data Table in Netutil .......................................................................... 53 Connection Data Table in Netutil ...................................................................................... 55 Other Attribute Data Table in Netutil ................................................................................ 57 Netutil Operations .......................................................................................................... 57 Prerequisites to Establish and Test a Remote Connection ..................................................... 58 Establish and Test a Remote Connection Using Netutil ......................................................... 59 Delete an Entry ............................................................................................................. 65 Change an Entry............................................................................................................ 67 Define an Installation Password for the Local Instance ........................................................ 71 Netutil Non-Interactive Mode ................................................................................................ 72 Command Line Flags in Netutil Non-interactive Mode .......................................................... 73 Create Function—Create a Remote User Authorization ........................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    435 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us