There was a bit more dialog today about impersonating the DB2 instance owner. It’s a quick way to get around controls that newer versions of DB2 and tighter Windows and network security have brought us. The extra step is annoying, but trying to convince the system you don’t need it is often worse.
Impersonation and elevation have become the “new normal” these days. I’ve grown so accustomed to opening “run as administrator” shells in UAC Windows (7/Vista/2008), typing runas commands in XP, and using sudo in Ubuntu that these have become second nature. And that level of user acceptance usually translates into approval to expand the practice, rather than a mandate to remove the inconvenience. Enhancing security usually includes putting up new barriers.
A former co-worker has often said that what we really need is software that determines whether a user’s intentions are honorable. Perhaps then security would become seamless. But it’s more likely that its implementation would also test our manners and fading patience.