General process of security administration

Table 9-2 describes the major tasks that are required to administer Adaptive Server in a secure manner and refers you to the documentation that contains the instructions for performing each task.

Table 9-2: General process for security administration

Task

Description

See

1. Install Adaptive Server, including auditing.

This task includes preparing for installation, loading files from your distribution medium, performing the actual installation, and administering the physical resources that are required.

The the installation documentation for your platform

2. Set up a secure administrative environment.

This includes enabling auditing, granting roles to individual users to ensure individual accountability, and assigning login names to System Administrators and System Security Officers.

Chapter 10, “Managing Adaptive Server Logins and Database Users”

3. Add user logins to the server; add users to databases; establish groups and roles; set proxy authorization.

Add logins, create groups, add users to databases, drop and lock logins, and assign initial passwords. Assign roles to users, create user-defined roles, and define role hierarchies and mutual exclusivity of roles.

Chapter 10, “Managing Adaptive Server Logins and Database Users”

4. Administer permissions for users, groups, and roles.

Grant and revoke permissions for certain SQL commands, executing certain system procedures, and accessing databases, tables, particular table columns, and views.

Chapter 11, “Managing User Permissions”

5. Administer the use of remote servers.

Establish and administer the access that is permitted between servers, add and drop remote server access, and map remote login names to local login names.

Chapter 13, “Managing Remote Servers,” and the Adaptive Server installation and configuration documentation for your platform

6. Set up and maintain auditing.

Determine what is to be audited, audit the use of Adaptive Server, and use the audit trail to detect penetration of the system and misuse of resources.

Chapter 12, “Auditing,” and the Adaptive Server installation and configuration documentation for your platform

7. Set up your installation for network-based security services.

Configure the server to use services, such as unified login, data confidentiality with encryption, data integrity, and determine security for remote procedures.

Chapter 14, “Using Kerberos, DCE, and Windows NT LAN Manager”