Executing proxy authorization  Reporting on permissions

Chapter 17: Managing User Permissions

Proxy authorization for applications

Figure 17-1 shows an application server logging in to Adaptive Server with the generic login “appl” to execute procedures and commands for several users. While “appl” impersonates Tom, the application has Tom’s permissions. Likewise, when “appl” impersonates Sue and John, the application has only Sue’s and John’s permissions, respectively.

Figure 17-1: Applications and proxy authorization

*



Copyright © 2005. Sybase Inc. All rights reserved. Reporting on permissions

View this book as PDF