Login
`
Templates, Tools and Utilities
|
||
Add a comment to an Icetips ArticlePlease add your comments to this article.
Please note that you must provide both a name and a valid email address in order
for us to publish your comment. Comments are moderated and are not visible until they have been approved. Spam is never approved!
Back to article list Search Articles Add Comment Printer friendly Direct link SQL Related Articles: Security access to SQL databases 2002-07-21 -- Michael Gould Newsgroups: softvelocity.products.c55ee
Dan,
With our application, we have a userid that our user's never see. It has
DBA rights when they first log's into the DB. Before actually logging into
the db though, we put up a login window. The first thing that happens is
our unseen ID logs into the db, then does a SetUser which is used by ASA to
that name. At that point, it locates the user record in our security tables
and validates their password. From that point on, the user only has access
to the tables and views that they are given rights to via our application.
On the DB side, the user id that the user originally logged in with is
totally unknown to the end user. Other tools don't have access because they
don't have the rights to get to the db with those other tools. We will
allow read access to certain views within the db from outside programs, but
we give them the "read only" id to use.
Michael Gould
"Dan Pressnell"
Today is November 23, 2024, 2:16 am This article has been viewed 35435 times. Google search has resulted in 31 hits on this article since January 25, 2004.
|
|