Access Control Database

Every installation of Enterprise Security, whether in a standalone or multimachine environment, has a central database that stores all of the user’s authorization and authentication information, such as user name and password credentials, digital certificates, and access permissions to the enterprise components. Unless you have installed and configured a third-party LDAP server to store authorization and authentication information, the database that stores this information is called the Access Control Database, or ACDB.

For information on configuring your environment to use a third-party LDAP server, see Chapter 10, “Configuring LDAP Authentication.” For information on configuring single sign-on capabilities through the Portal Interface, see Chapter 12, “Certificate-Based Authentication.”

In addition to the information that is automatically inserted into the database, there is configurable information that is defined and implemented by the PSO. The PSO configures user-specific and asset-specific information using Enterprise Security Manager—see “Enterprise Security Manager”.

The ACDB stores information for each user, role, and asset. Figure 1-5 shows the content of a user record.

Figure 1-5: Access Control Database record for a user

The records for roles and assets are similar to those for users. You can define access permissions for roles and then assign roles to users, a process that simplifies security management for large user populations. By defining access permissions for roles to access different assets, you can specify the extent of what a user in that role can do.