Database security methods?

From: Mike Eggleston <mikee_at_wfc.com>
Date: 1995/05/04
Message-ID: <MIKEE.95May4083842_at_sys8.wfc.com>#1/1


Hi,

I'm looking for everyone's opinions on database security implementation methods. I have considered using schemas and using a security table.

schemas:
create one schema for the logical database create N schemas for N groups that have different   permissions/capabilities
grant users access to one or more of the security schemas

security table:
create table with name and password
create table with all possible module names create table that relates users with modules with an individual access   lever per module

This is what I've thought of so far. Anyone have any opinions or different ideas?

Thanks

Mike

--
--
Mike Eggleston       Walker Financial, Inc.

(817)732-0398 3909 Hulen Street
(817)735-1726 (FAX) Fort Worth, Texas 76107
Only my opinions.
Received on Thu May 04 1995 - 00:00:00 CEST

Original text of this message