Previous Topic: CA Datacom SQL SecurityNext Topic: Resource Control


SQL Security Model

In the SQL Security Model, tables, views, columns, and plans are securable resources. This model includes the automatic granting and revoking of authorizations as tables are created and dropped. It also provides the automatic cascading of revokes and view deletions when authorizations are revoked. SQL security authorizations are established with simple SQL GRANT and REVOKE statements, which may be embedded in programs or executed interactively through the CA Datacom Datadictionary Interactive SQL Service Facility or the CA Dataquery SQL Mode. For more information, see SQL Security Model. Plan security is discussed in detail in Plan Security.

Note: When an SQL user who created and bound a plan loses an access right to one of the resources used in the plan, the plan is marked invalid. If another user has been executing that plan by using plan security, they find they are then prohibited from using that plan until it has been successfully rebound.

Securing Distributed Access

For databases secured under the SQL Security Model, the Security Facility always validates the authorization of the user at the site (MUF) where the application is executing.