SQL/MP Installation and Management Guide
Planning Database Security and Recovery
HP NonStop SQL/MP Installation and Management Guide—523353-004
4-3
Sample Authorization Schemes
°
The tables, views, and indexes are secured for access by servers; all
application use is through programs initiated by the application environment.
°
Queries on tables or views are limited to the database administrator and the
super ID user.
The most important security factor in this environment is securing the catalogs from
unauthorized DDL statements that could alter the database or from any operations
that could allow an unauthorized program to be registered.
•
Development system
In this system, many user groups share the same or similar databases while the
application passes from development to testing, to documentation, and finally to
release control. This scheme probably should use one or more catalogs for each
user group.
Characteristics of system use are:
°
Each user group needs control of the database and the ability to register
programs in a catalog.
°
The user groups might share a database, and changes to the catalog
descriptions must be coordinated with each group.
°
If each user group uses a separate catalog, users will frequently copy tables,
dependent views, and indexes by using the DUP command.
The most important security factor in this environment is securing the catalogs and
objects so that users can perform the many development tasks. The catalog and
object security should be simple to allow an authorized user to duplicate the entire
application for the next phase of development.
•
Several unique application groups
These user groups share a system but have unique databases. This scheme
should use a system catalog plus one or more catalogs for each application group.
Users do not need to move or copy objects among these catalogs.
Characteristics of system use are:
°
Each user group has a database administrator to manage the database and
the application for the group.
°
Each user group wants autonomy and protection from the other groups. The
important security factor in this environment is the ability to restrict accidental
use by other groups.
For authorization in general, you should create the simplest authority and security
scheme possible. Dependent views, indexes, and programs should be owned by the
same user ID, and only that user ID should have purge authority. With this
authorization scheme, DDL operations and utility operations that can affect the entire
set of dependent objects, such as DUP, are simplified. Because anyone who has