Chapter 13 Managing Database Access


Understanding database access management

In this manual, we call database access management the set of tools that let the users of the database carry out their jobs effectively while preserving privacy and integrity of information within the database.

Depending on the target DBMS, the setting up of a secure database environment implies the following tasks:

The Physical Data Model supports these concepts and lets you:

Reverse engineering

During reverse engineering by script, the permission and privilege grant orders are reverse engineered only if the user, group, or role already exist in the model.

If you reverse engineer into a new model, the permission and privilege grant orders are reverse engineered if the user, group, or role creation orders are in the same script.

This does not apply to ODBC reverse engineering.

 


Copyright (C) 2005. Sybase Inc. All rights reserved.