Replication with Infosphere CDC : Overview of IBM InfoSphere CDC replication between solidDB® servers : Security and authentication
  
Security and authentication
The cache and backend databases are protected by a traditional authentication mechanism in which a user has to provide a valid user ID and password combination to connect to a database. You can also use the operating-system-based external authentication mechanism available with solidDB®.
The user account that is used for the IBM InfoSphere CDC instances to access the databases has to have sufficient privileges to access and modify the data and metadata. A database administrator username is recommended.
The IBM InfoSphere CDC instances uses scrambling to store the user names and passwords, that is, the authentication data is encrypted using a weak encryption method.
The traffic between the IBM InfoSphere CDC replication engines and the databases is encrypted in all cases. The encryption is provided, or available, in the database-specific JDBC drivers.
The traffic between IBM InfoSphere CDC replication engines is unencrypted.
 
 
See also
Overview of IBM InfoSphere CDC replication between solidDB® servers