The row-level access control provides a powerful and flexible means of protecting data, down to the row level. Administrators define access rules that are based on the value of individual data elements, and the server enforces these rules transparently. Once an administrator defines an access rule, it is automatically invoked whenever the affected data is queried through applications, ad hoc queries, stored procedures, views, and so on.
Using a rule-based access control simplifies both the security administration of an Adaptive Server installation and the application development process because it is the server, not the application, that enforces security. This allows developers to concentrate on implementing business functionality while administrators focus on defining a security policy to enforce consistently across the entire server. These are the features that allow you to implement row-level access control:
Access Rules
Application Context Facility
Login Triggers
Domain Integrity Rules
For more information on how to implement row-level access controls, see “Using row-level access control”.