ODBC Server Installation and Management Manual

Managing the NonStop ODBC Server
HP NonStop ODBC Server Installation and Management Manual429395-002
4-14
Authorization and Security
Each process involved with NonStop ODBC Server runs under a Guardian user name,
and that user name is used to authorize access to objects. Each user has a default
security vector, and when a process creates an object for that user, that object is
secured with the default security vector, unless options in the create process override.
After being created, the security vector for an object can usually be changed.
Table 4-1 shows the authorizations needed to perform each NonStop ODBC Server
action.
The following mnemonics are used in Table 4-1 to describe the authorization
requirements:
Entries shown in parentheses indicate that the authority is needed only under limited
conditions. For USERCAT, for example, write authority to the NonStop SQL/MP system
catalog is required only when executing the INSTALL function.
R Read the object
W Write the object
E Execute the object
O Owner of the process
CR Create the object (and SQL compile it, if applicable); creator owns the object.
CRO Create SQL/MP objects (in the catalog)
LI License the object
Table 4-1. NonStop ODBC Server Security Requirements (page 1 of 2)
Accessor
NSSQL/MP SYSTEM CATALOG
NSODBC SYSCAT
NSODBC USERCAT
SCSOBJ
NSODBC Server
NOSUTIL
SQLCOMP
Notes
NOSINST R, W,
CRO
CR CR CR E Must be privileged
user
(1)
NOSUTIL
START
R R E E E E Must be privileged
user
NOSUTIL
ADD/
REMOVE
RR, W EE
(2)