Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

While access in order to manipulate the authentication information a database requires the database password, a system administrator still has to manually enter and modify user passwords with the associated security risks and maintenance costs.

Example Database Tables


Code Block
titleExample sql for Oracle
collapsetrue
create table sos_user(
id number(9) not null ,
sos_user_name varchar2(250),
sos_user_password varchar2 (250),
PRIMARY KEY ( "ID" )
)


create table sos_user_role(
id number(9) not null ,
sos_user_role varchar2(250),
PRIMARY KEY ( "ID" )
)


create table sos_user2role(
id number(9) not null ,
role_id number(9) null ,
user_id number(9) null ,
PRIMARY KEY ( "ID" )
)


create table sos_user_permission(
id number(9) not null ,
role_id number(9) null ,
user_id number(9) null ,
sos_user_permission varchar2(250),
PRIMARY KEY ( "ID" )
)


The following table names and structure have to be used when configuring database authentication:

...

Table mapping users to roles

COLUMN_NAMEDATA_TYPENULLABLEDATA_DEFAULT
IDNUMBER(9,0)No(null)
ROLE_IDNUMBER(9,0)Yes(null)
USER_IDNUMBER(9,0)Yes(null)


Table of Roles (SOS_USER_ROLE) - Contents

...