Db2 Odbc Windows 10
In this post I describe how to install the IBM DB2 ODBC driver on Windows Server 2008 R2 SP1 and how to configure a data source to connect to a DB2 database. Environment Client OS: Windows Server 2008 R2 SP1 64b Database Host OS: AIX 6.1 RDBMS: DB2 9.7 Procedure. Download the IBM DB2 ODBC driver from the IBM download website (You only need the ODBC driver, not the complete client). Unzip the ODBC driver on the local machine, for example, in C:/Programs Files/IBM. Register the driver (run the Command Prompt as Administrator).
Db2 Odbc Driver For Windows Server 2008 R2
Open ODBC data source administrator. Add a new data source. Create the db2dsdrivercfg with the minimum DSN and database information.
Microsoft Odbc Driver For Db2
Select “IBM DATA SERVER DRIVER for ODBC” from the diver list and press Finish. Enter the Data source name, it is recommend to be the same as the database name, and the description and press on the button “Add”. You do not need to add any parameter, need to get in there in order to activate the button OK of the “ODBC IMB Driver – Add” dialog box. Close the “CLI/ODBC setting” dialog box. Click on “OK” on the ODBC IBM DB2 Driver – Add” dialog box.
Test connectivity. In the ODBC data source manager, select the new data sources and click on “Configure”. Enter the userid and password of the DB2 user and click on “Connect”.
If connectivity is successful, you will receive a confirmation message. Your ODBC data source for DB2 is ready to use.
Priority. Time Guideline Version(s) High Risk (CVSS 8+ or industry equivalent) 30 days Active (i.e. Latest shipping version) and all Supported versions Medium Risk (CVSS 5-to-8 or industry equivalent) 180 days Active (i.e. Latest shipping version) Low Risk (CVSS 0-to-5 or industry equivalent) Next major release or best effort Active (i.e.
Latest shipping version). Priority is established based on the current version of the Common Vulnerability Scoring System (CVSS), an open industry standard for assessing the severity of computer system security vulnerabilities. For additional information on this scoring system, refer to.