O'Reilly logo

Database Administration: The Complete Guide to Practices and Procedures by Craig S. Mullins

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14. Database Security

The basic security and authorization approach taken by DBMS vendors to secure database access is that all database resources are controlled by the DBMS. There are no default authorizations given to any user just because the user logs in to the DBMS. Therefore, for a user to be able to perform any DBMS operation or function, one of the following conditions must exist:

  • The user has been granted the ability to perform that function or operation

  • That operation or function has been granted generically to all users

Using the security features of the DBMS, the DBA can set up the environment such that only certain users or certain application programs are allowed to perform certain ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required