Defining the Security Scheme [ Getting Started with HP IMAGE/SQL ] MPE/iX 5.0 Documentation
Getting Started with HP IMAGE/SQL
Defining the Security Scheme
The radio station manager wants to have complete access to all the
information in the database. Announcers need to read information about
Albums, Selections, Composers, and the Log. The program director adds
information about new albums and decides what will be played for
publication in the monthly listener guide.
A security scheme will allow database accessors to do only what has been
assigned or expected of them and nothing more. The security can be
broken down to these three levels:
Manager Read and Write all entities
Director Read all entities, Write all but Log
Announcer Read all entities, Write Log
To complete this security scheme in TurboIMAGE/XL, you will define a
password for each of these levels and assign it a numeric value. For
simplicity sake, we will use:
MGR 10
DIR 20
ANNCR 30
Applying these to the data sets results in the following:
Albums Read 10, 20, 30; Write 10, 20
Selections Read 10, 20, 30; Write 10, 20
Composers Read 10, 20, 30; Write 10, 20
Log Read 10, 20, 30; Write 10, 30
Each individual will be assigned one of these passwords to be used when
accessing the database. The password will designate the data that can be
accessed and the method of access.
The next section will show you the schema for our now complete
TurboIMAGE/XL database. In that schema, you will see the syntax for this
security schema.
MPE/iX 5.0 Documentation