Database security methods?
From: Mike Eggleston <mikee_at_wfc.com>
Date: 1995/05/04
Message-ID: <MIKEE.95May4083842_at_sys8.wfc.com>#1/1
Date: 1995/05/04
Message-ID: <MIKEE.95May4083842_at_sys8.wfc.com>#1/1
Hi,
I'm looking for everyone's opinions on database security implementation methods. I have considered using schemas and using a security table.
schemas:
create one schema for the logical database
create N schemas for N groups that have different
permissions/capabilities
grant users access to one or more of the security schemas
security table:
create table with name and password
create table with all possible module names
create table that relates users with modules with an individual access
lever per module
This is what I've thought of so far. Anyone have any opinions or different ideas?
Thanks
Mike
-- -- Mike Eggleston Walker Financial, Inc.Received on Thu May 04 1995 - 00:00:00 CEST
(817)732-0398 3909 Hulen Street
(817)735-1726 (FAX) Fort Worth, Texas 76107
Only my opinions.