Table 13-1 describes the major tasks that are required to administer Adaptive Server in a secure manner and refers you to the documentation that contains the instructions for performing each task.
Task |
Description |
See |
---|---|---|
1. Install Adaptive Server, including auditing. |
This task includes preparing for installation, loading files from your distribution medium, performing the actual installation, and administering the physical resources that are required. |
The the installation documentation for your platform |
2. Set up a secure administrative environment. |
This includes enabling auditing, granting roles to individual users to ensure individual accountability, assigning login names to System Administrators and System Security Officers and establishing password and login policies. |
Chapter 14, “Managing Adaptive Server Logins, Database Users, and Client Connections” |
3. Add user logins to the server; add users to databases; establish groups and roles; set proxy authorization. |
Add logins, create groups, add users to databases, drop and lock logins, and assign initial passwords. Assign roles to users, create user-defined roles, and define role hierarchies and mutual exclusivity of roles. |
Chapter 14, “Managing Adaptive Server Logins, Database Users, and Client Connections” |
4. Administer permissions for users, groups, and roles. |
Grant and revoke permissions for certain SQL commands, executing certain system procedures, and accessing databases, tables, particular table columns, and views. |
|
5. Administer the use of remote servers. |
Establish and administer the access that is permitted between servers, add and drop remote server access, and map remote login names to local login names. |
Chapter 15, “Managing Remote Servers,” and the Adaptive Server installation and configuration documentation for your platform |
6. Set up and maintain auditing. |
Determine what is to be audited, audit the use of Adaptive Server, and use the audit trail to detect penetration of the system and misuse of resources. |
Chapter 18, “Auditing,” and the Adaptive Server installation and configuration documentation for your platform |
7. Set up your installation for advanced authentication mechanisms and network security.. |
Configure the server to use services, such as LDAP, PAM or Kerberos- based User Authentication, Windows unified Login, , data confidentiality with encryption, data integrity.. |
Chapter 16, “External Authentication” and Chapter 19, “Confidentiality of Data.” |
Copyright © 2005. Sybase Inc. All rights reserved. |