ibm-information-center/dist/eclipse/plugins/i5OS.ic.dbp_5.4.0.1/rbafotgrpgm.htm

98 lines
6.7 KiB
HTML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="Monitor the use of trigger programs" />
<meta name="abstract" content="DB2 Universal Database for iSeries provides the capability to associate trigger programs with database files. Trigger-program capability is common across the industry for high-function database managers." />
<meta name="description" content="DB2 Universal Database for iSeries provides the capability to associate trigger programs with database files. Trigger-program capability is common across the industry for high-function database managers." />
<meta name="DC.subject" content="trigger program, monitoring use" />
<meta name="keywords" content="trigger program, monitoring use" />
<meta name="DC.Relation" scheme="URI" content="rbaforzahftrb2.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1998, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rbafotgrpgm" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>Monitor the use of trigger programs</title>
</head>
<body id="rbafotgrpgm"><a name="rbafotgrpgm"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">Monitor the use of trigger programs</h1>
<div><p>DB2
Universal Database™ for iSeries™ provides the capability to associate trigger
programs with database files. Trigger-program capability is common across
the industry for high-function database managers.</p>
<p>When you associate a trigger program with a database file, you specify
when the trigger program runs. For example, you can set up the customer order
file to run a trigger program whenever a new record is added to the file.
When the customer's outstanding balance exceeds the credit limit, the trigger
program can print a warning letter to the customer and send a message to the
credit manager.</p>
<div class="p">Trigger programs are a productive way both to provide application functions
and to manage information. Trigger programs also provide the ability for someone
with devious intentions to create a <span class="q">"Trojan horse"</span> on your system. A
destructive program can be sitting and waiting to run when a certain event
occurs in a database file on your system. <div class="note"><span class="notetitle">Note:</span> In history, the Trojan horse
was a large hollow wooden horse that was
filled with Greek soldiers. After the horse was introduced within the walls
of Troy, the soldiers climbed out of the horse and fought the Trojans. In
the computer world, a program that hides destructive functions is often called
a Trojan horse.</div>
</div>
<p>When your system ships, the ability to add a trigger program to a database
file is restricted. If you are managing object authority carefully, the typical
user will not have sufficient authority to add a trigger program to a database
file. (Appendix D in the <cite>iSeries Security Reference</cite> book
tells the authority that is required or all commands, including the Add Physical
File Trigger (ADDPFTRG) command.</p>
<p>You can use the Print Trigger Programs (PRTTRGPGM)
command to print a list of all the trigger programs in a specific library
or in all libraries. The following example shows the report:</p>
<pre> Trigger Programs (Full Report)
Specified library . . . . . . : CUSTLIB
Trigger Trigger Trigger Trigger Trigger
Library File Library Program Time Event Condition
CUSTLIB MB106 ARPGMLIB INITADDR Before Update Always
CUSTLIB MB107 ARPGMLIB INITNAME Before Update Always</pre>
<p>You can use the initial report as a base to evaluate any trigger programs
that already exist on your system. Then, you can print the changed report
regularly to see whether new trigger programs have been added to your system.</p>
<div class="p">When you evaluate trigger programs, consider the following questions: <ul><li>Who created the trigger program? You can use the Display Object Description
(DSPOBJD) command to determine this.</li>
<li>What does the program do? You will have to look at the source program
or talk to the program creator to determine this. For example, does the trigger
program check to see who the user is? Perhaps the trigger program is waiting
for a particular user (QSECOFR) in order to gain access to system resources.</li>
</ul>
</div>
<p>After you have established a base of information, you can print the changed
report regularly to monitor new trigger programs that have been added to your
system. The following example shows the changed report:</p>
<pre> Trigger Programs (Changed Report)
Specified library . . . . . . : LIBX
Last changed report . . . . . : 96/01/21 14:33:37
Trigger Trigger Trigger Trigger Trigger
Library File Library Program Time Event Condition
INVLIB MB108 INVPGM NEWPRICE After Delete Always
INVLIB MB110 INVPGM NEWDSCNT After Delete Always</pre>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rbaforzahftrb2.htm" title="These topics discuss recommendations, precautions, and error messages for trigger programs. Information about monitoring and commitment control is also included.">Other important information about working with triggers</a></div>
</div>
</div>
</body>
</html>