1 SQL Authorization Privileges Grant and Revoke Grant Diagrams.

Slides:



Advertisements
Similar presentations
1 More SQL Database Modification Defining a Database Schema Views.
Advertisements

1 Lecture 10: Transactions. 2 The Setting uDatabase systems are normally being accessed by many users or processes at the same time. wBoth queries and.
Chapter 7 Notes on Foreign Keys Local and Global Constraints Triggers.
Oracle9i Database Administrator: Implementation and Administration 1 Chapter 12 System and Object Privileges.
Security and Authorization. Introduction to DB Security Secrecy: Users shouldn’t be able to see things they are not supposed to. –E.g., A student can’t.
1 Introduction to SQL Multirelation Queries Subqueries Slides are reused by the approval of Jeffrey Ullman’s.
Security and Authorization. Introduction to DB Security Secrecy: Users shouldn’t be able to see things they are not supposed to. –E.g., A student can’t.
1 More SQL Database Modification Defining a Database Schema Views Source: slides by Jeffrey Ullman.
Constraints and Triggers Foreign Keys Local and Global Constraints Triggers.
1 Chapter 7 System Aspects of SQL uSQL in a Programming Environment uTransactions uAuthorization.
1 Constraints Foreign Keys Local and Global Constraints Triggers Source: slides by Jeffrey Ullman.
1 More SQL Defining a Database Schema Views. 2 Defining a Database Schema uA database schema comprises declarations for the relations (“tables”) of the.
1 Constraints Foreign Keys Local and Global Constraints Triggers.
1 SQL Authorization Privileges Grant and Revoke Grant Diagrams.
1 Constraints Foreign Keys Local and Global Constraints Triggers.
Winter 2002Arthur Keller – CS 18013–1 Schedule Today: Feb. 21 (TH) u Transactions, Authorization. u Read Sections Project Part 5 due. Feb. 26.
CPSC-608 Database Systems Fall 2011 Instructor: Jianer Chen Office: HRBB 315C Phone: Notes #4.
Fall 2001Arthur Keller – CS 18012–1 Schedule Nov. 6 (T) Transactions, Authorization. u Read Sections Nov. 8 (TH) Object-Oriented Database Design.
Security and Authorization. Introduction to DB Security Secrecy: Users shouldn’t be able to see things they are not supposed to. –E.g., A student can’t.
Dec 15, 2003Murali Mani Transactions and Security B term 2004: lecture 17.
Cs3431 Transactions, Logging and Security. cs3431 Transactions: What and Why? A set of operations on a database must appear as one “unit”. Example: Consider.
1 PL/SQL Oracle’s Version of Triggers and PSM. 2 PL/SQL uOracle uses a variant of SQL/PSM which it calls PL/SQL. uPL/SQL not only allows you to create.
Triggers, security and authorization in SQL Niki Sardjono Niki Sardjono CS 157A sect 2 Prof. S. M. Lee.
1 More SQL Extended Relational Algebra Outerjoins, Grouping/Aggregation Insert/Delete/Update.
Security and Integrity
Objectives of the Lecture :
Database Systems Marcus Kaiser School of Computing Science Newcastle University.
Week 6 Lecture 2 System and Object Privileges. Learning Objectives  Identify and manage system and object privileges  Grant and revoke privileges to.
Data Modeling and Database Design
Constraints on Relations Foreign Keys Local and Global Constraints Triggers Following lecture slides are modified from Jeff Ullman’s slides
Winter 2006Keller, Ullman, Cushing9–1 Constraints Commercial relational systems allow much more “fine-tuning” of constraints than do the modeling languages.
1 IT 244 Database Management System Lecture 11 More SQL Constraints &Triggers, SQL Authorization,Transactions Foreign Keys, Local and Global Constraints,
Controlling User Access. Objectives After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and.
1 Database Administration. 2 Objectives  Understand, create, and drop views  Grant and revoke users’ privileges  Understand and obtain information.
Database Management COP4540, SCS, FIU Constraints and security in SQL (Ch. 8.6, Ch22.2)
Winter 2006Keller, Ullman, Cushing13–1 TRANSACTION MANAGEMENT Airline Reservationsmany updates Statistical Abstract of the USmany queries Atomicity – all.
1 Chapter 6 Constraints uForeign Keys uConstraints.
DATA AND SCHEMA MODIFICATIONS CHAPTERS 4,5 (6/E) CHAPTER 8 (5/E) 1.
Chapter 13Introduction to Oracle9i: SQL1 Chapter 13 User Creation and Management.
Security and User Authorization in SQL CIS 4301 Lecture Notes Lecture /18/2006.
Oracle 11g: SQL Chapter 7 User Creation and Management.
1 SQL Authorization (Chap. 8.7) Privileges Grant and Revoke Grant Diagrams.
Database System Concepts, 6 th Ed. ©Silberschatz, Korth and Sudarshan See for conditions on re-usewww.db-book.com Chapter 4: Intermediate.
Creating and Revoking Object Privileges. 2 home back first prev next last What Will I Learn? Explain what a ROLE is and what its advantages are. Construct.
1 Database Design: DBS CB, 2 nd Edition SQL in a Server Environment: CLI & JDBC & Security Ch Ch. 9.6 – Ch 10.1.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Jennifer Widom Authorization. Jennifer Widom Authorization Database Authorization  Make sure users see only the data they’re supposed to see  Guard.
1 Data Modification with SQL CREATE TABLE, INSERT, DELETE, UPDATE Slides from
Database Security Advanced Database Dr. AlaaEddin Almabhouh.
1 Lecture 11 PL/SQL Slides from
Database System Implementation CSE 507
Managing Privileges.
Privileges Grant and Revoke Grant Diagrams
Privileges Grant and Revoke Grant Diagrams
Privileges Grant and Revoke Grant Diagrams
Foreign Keys Local and Global Constraints Triggers
Schedule Today Transactions, Authorization. Sections
SQL Authorization Book: A First Course in Database Systems
CPSC-608 Database Systems
CPSC-310 Database Systems
Privileges Grant and Revoke Grant Diagrams
Session #, Speaker Name Database Privileges 11/29/2018.
אבטחת נתונים בסביבת SQL Data Security
Privileges Grant and Revoke Grant Diagrams
CMSC-461 Database Management Systems
SQL – Constraints & Triggers
CPSC-608 Database Systems
Presentation transcript:

1 SQL Authorization Privileges Grant and Revoke Grant Diagrams

2 Authorization uA file system identifies certain privileges on the objects (files) it manages. wTypically read, write, execute. uA file system identifies certain participants to whom privileges may be granted. wTypically the owner, a group, all users.

3 Privileges --- (1) uSQL identifies a more detailed set of privileges on objects (relations) than the typical file system. uNine privileges in all, some of which can be restricted to one column of one relation.

4 Privileges --- (2) uSome important privileges on a relation: 1.SELECT = right to query the relation. 2.INSERT = right to insert tuples. wMay apply to only one attribute. 3.DELETE = right to delete tuples. 4.UPDATE = right to update tuples. wMay apply to only one attribute.

5 Example: Privileges uFor the statement below: INSERT INTO Beers(name) SELECT beer FROM Sells WHERE NOT EXISTS (SELECT * FROM Beers WHERE name = beer); uWe require privileges SELECT on Sells and Beers, and INSERT on Beers or Beers.name. beers that do not appear in Beers. We add them to Beers with a NULL manufacturer.

6 Authorization ID’s uA user is referred to by authorization ID, typically their name. uThere is an authorization ID PUBLIC. wGranting a privilege to PUBLIC makes it available to any authorization ID.

7 Granting Privileges uYou have all possible privileges on the objects, such as relations, that you create. uYou may grant privileges to other users (authorization ID’s), including PUBLIC. uYou may also grant privileges WITH GRANT OPTION, which lets the grantee also grant this privilege.

8 The GRANT Statement uTo grant privileges, say: GRANT ON TO ; uIf you want the recipient(s) to be able to pass the privilege(s) to others add: WITH GRANT OPTION

9 Example: GRANT uSuppose you are the owner of Sells. You may say: GRANT SELECT, UPDATE(price) ON Sells TO sally; uNow Sally has the right to issue any query on Sells and can update the price component only.

10 Example: Grant Option uSuppose we also grant: GRANT UPDATE ON Sells TO sally WITH GRANT OPTION; uNow, Sally not only can update any attribute of Sells, but can grant to others the privilege UPDATE ON Sells.  Also, she can grant more specific privileges like UPDATE(price) ON Sells.

11 Revoking Privileges REVOKE ON FROM ; uYour grant of these privileges can no longer be used by these users to justify their use of the privilege. wBut they may still have the privilege because they obtained it independently from elsewhere.

12 REVOKE Options uWe must append to the REVOKE statement either: 1.CASCADE. Now, any grants made by a revokee are also not in force, no matter how far the privilege was passed. 2.RESTRICT. If the privilege has been passed to others, the REVOKE fails as a warning that something else must be done to “chase the privilege down.”

13 Grant Diagrams uNodes = user/privilege/option/isOwner? wUPDATE ON R, UPDATE(a) on R, and UPDATE(b) ON R live in different nodes. wSELECT ON R and SELECT ON R WITH GRANT OPTION live in different nodes. uEdge X ->Y means that node X was used to grant Y.

14 Notation for Nodes uUse AP for the node representing authorization ID A having privilege P. wP * represents privilege P with grant option. wP ** represents the source of the privilege P. That is, AP ** means A is the owner of the object on which P is a privilege. Note ** implies grant option.

15 Manipulating Edges --- (1) uWhen A grants P to B, We draw an edge from AP * or AP ** to BP. wOr to BP * if the grant is with grant option. uIf A grants a subprivilege Q of P [say UPDATE(a) on R when P is UPDATE ON R] then the edge goes to BQ or BQ *, instead.

16 Manipulating Edges --- (2) uFundamental rule: User C has privilege Q as long as there is a path from XQ ** (the origin of privilege Q ) to CQ, CQ *, or CQ**. wRemember that XQ** could be CQ**. wAlso: the path could be from a superprivilege of Q, rather than Q itself.

17 Manipulating Edges --- (3) uIf A revokes P from B with the CASCADE option, delete the edge from AP to BP. uIf A uses RESTRICT, and there is an edge from BP to anywhere, then reject the revocation and make no change to the graph.

18 Manipulating Edges --- (4) uHaving revised the edges, we must check that each node has a path from some ** node, representing ownership. uAny node with no such path represents a revoked privilege and is deleted from the diagram.

19 Example: Grant Diagram AP** A owns the object on which P is a privilege BP* A: GRANT P TO B WITH GRANT OPTION CP* B: GRANT P TO C WITH GRANT OPTION CP A: GRANT P TO C

20 Example: Grant Diagram AP**BP*CP* CP A executes REVOKE P FROM B CASCADE; However, C still has P without grant option because of the direct grant. Not only does B lose P*, but C loses P*. Delete BP* and CP*. Even had C passed P to B, both nodes are still cut off.