Enforcement of security rules for access to the MDB is provided by the underlying relational database management system (RDBMS).
Database objects in the MDB include tables, views, procedures, and rules. Typically, a CA product utilizes a specific set of database objects (such as tables, indexes, views, constraints and so forth) to expose information to the user. While there may be many shared objects between products, the MDB security model ensures that the user of a CA product may only access the database objects for that product. For example, a customer using CA's Unicenter Service Desk product may only access tables used by that product and may not access tables for another product.
The MDB security model restricts access to the database objects of a product by using underlying RDBMS user groups. User groups (Ingres), or roles (Oracle SQL Server) are created for each product or for each product application component. Users of a product, or users created for the product's component, are assigned to a user group as their default. Any number of users may be associated with a user group. A product's access to data, procedures, and rules is restricted by establishing user groups of database objects and associating database users with the groups.
The MDB is created with many user groups already defined. Products specify these groups when they connect to the database. If you choose to use external tools such as report writers to access MDB data, you may limit the report writer user's MDB access by using these user groups as part of the database connection information.
| Copyright © 2008 CA. All rights reserved. | Tell Technical Publications how we can improve this information |