353
C H A P T E R 1 0
Managing User IDs and
Permissions
About this chapter
Each user of a database must be assigned a unique user ID: the name they
type when connecting to the database. This chapter describes how to
manage user IDs.
An overview of database permissions
Proper management of user IDs and permissions is essential in a data
warehouse. It allows users to carry out their jobs effectively, while
maintaining the security and privacy of appropriate information within the
database.
You use SQL statements for assigning user IDs to new users of a database,
granting and revoking permissions for database users, and finding out the
current permissions of users.
Database permissions are assigned to user IDs. Throughout this chapter,
the term user is used as a synonym for user ID. You should remember,
however, that permissions are granted and revoked for each user ID.
Setting up individual user
IDs
Even if there are no security concerns regarding a multiuser database,
there are good reasons for setting up an individual user ID for each user.
The administrative overhead for individual user IDs is very low if a group
with the appropriate permissions is set up. Groups of users are discussed
later in this chapter.
Among the reasons for using individual user IDs are the following:
•
The network server screen and the listing of connections in Sybase
Central are both much more useful with individual user IDs, as you
can tell which connections are which users.
•
The backup log identifies the user ID that created the backup.
Summary of Contents for Adaptive Server IQ 12.4.2
Page 1: ...Administration and Performance Guide Adaptive Server IQ 12 4 2 ...
Page 16: ...xvi ...
Page 20: ...Related documents xx ...
Page 40: ...Compatibility with earlier versions 20 ...
Page 118: ...Troubleshooting startup shutdown and connections 98 ...
Page 248: ...Importing data by replication 228 ...
Page 306: ...Integrity rules in the system tables 286 ...
Page 334: ...Cursors in transactions 314 ...
Page 396: ...Users and permissions in the system tables 376 ...
Page 438: ...Determining your data backup and recovery strategy 418 ...
Page 484: ...Network performance 464 ...
Page 500: ...System utilities to monitor CPU use 480 ...
Page 514: ...Characteristics of Open Client and jConnect connections 494 ...
Page 536: ...Index 516 ...