User Identification and Special Users

Database management systems vary widely in their approaches to identifying users, both in basic concept and in detail. Not much can be said that applies across the board; a broad outline of the major variations is about the best that can be done.

Some systems rely on the user's identity at the operating system level: In other words, they recognize as an authorized user anyone who can log on to the computer. That's not to say, however, that anyone who can access the database system will be able to do much of anything in it.

More sophisticated database management systems have their own identification and authorization mechanisms that require each user to have an established name (sometimes called an account ...

Get Practical SQL Handbook, The: Using SQL Variants, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.