Re: Database security methods?

From: Doris Jetz <yeer_at_cadvision.com>
Date: 1995/05/08
Message-ID: <3oll73$f4r_at_huey.cadvision.com>#1/1


In article <MIKEE.95May4083842_at_sys8.wfc.com>, mikee_at_wfc.com says...

>Hi,
 

>I'm looking for everyone's opinions on database security
>implementation methods. I have considered using schemas and using a
>security table.
 

>schemas:
>create one schema for the logical database
>create N schemas for N groups that have different
> permissions/capabilities
>grant users access to one or more of the security schemas
 

>security table:
>create table with name and password
>create table with all possible module names
>create table that relates users with modules with an individual access
> lever per module
 

>This is what I've thought of so far. Anyone have any opinions or
>different ideas?
 

>Thanks
 

>Mike
 

>Mike Eggleston Walker Financial, Inc.
>(817)732-0398 3909 Hulen Street
>(817)735-1726 (FAX) Fort Worth, Texas 76107
>Only my opinions.

What database are you using? If it is oracle, why don't you use roles? You can create roles and assign all kinds of object and system privilegs to the roles and then assign the role to the users. The roles can be protected by passwords.

This makes administration much easier and can leave you with a fairly secure database.

Doris Received on Mon May 08 1995 - 00:00:00 CEST

Original text of this message