An example of setting up security  Identification and authentication

Chapter 13: Getting Started With Security Administration in Adaptive Server

Introduction to Security Features in Adaptive Server

Table 13-4 describes the security features in Adaptive Server.

Table 13-4: Major security features

Security feature

Description

Identification and authentication controls

Ensures that only authorized users can log into the system. In addition to password based login authentication, Adaptive Server supports external authentication using Kerberos, LDAP, or PAM.

Discretionary Access Controls (DAC)

Provides access controls that give object owners the ability to restrict access to objects, usually with the grant and revoke commands. This type of control is dependent upon an object owner’s discretion.

Division of roles

Allows an administrator to grant privileged roles to specified users so only designated users can perform certain tasks. Adaptive Server has predefined roles, called “system roles,” such as System Administrator and System Security Officer. In addition, Adaptive Server allows System Security Officers to define additional roles, called “user-defined roles.”

Accountability

Provides the ability to audit events such as logins, logouts, server start operations, remote procedure calls, accesses to database objects, and all actions performed by a specific user or with a particular role active. Adaptive Server also provides a single option to audit a set of server-wide security-relevant events.

Confidentiality of data

Maintains a confidentiality of data using encrytion for Client-Server communications, available with Kerberos or SSL. Data that is not active is kept confidential with password-protected database backup.





Copyright © 2005. Sybase Inc. All rights reserved. Identification and authentication

View this book as PDF