Overview
The security scheme for SQL processing is both based upon, and compliant with, the ANSI SQL standard.
The major secured resource in SQL processing is the table resource type. CA IDMS internal security validates a user's right to access a table according to the rules specified in the ANSI SQL standard. Additional facilities control table creation and alteration.
If resources accessed in SQL processing are secured externally, rules for accessing each resource type must be defined to the external security system. Reference to external security in the following discussion is limited to information about how CA IDMS centralized security processes a request for an externally secured resource.
|
Copyright © 2014 CA.
All rights reserved.
|
|