Ingres 10.1 Security Guide
Total Page:16
File Type:pdf, Size:1020Kb
Ingres 10S Security Guide ING-10-SG-06 This Documentation is for the end user's informational purposes only and may be subject to change or withdrawal by Actian Corporation ("Actian") at any time. This Documentation is the proprietary information of Actian and is protected by the copyright laws of the United States and international treaties. It is not distributed under a GPL license. You may make printed or electronic copies of this Documentation provided that such copies are for your own internal use and all Actian copyright notices and legends are affixed to each reproduced copy. You may publish or distribute this document, in whole or in part, so long as the document remains unchanged and is disseminated with the applicable Actian software. Any such publication or distribution must be in the same manner and medium as that used by Actian, e.g., electronic download via website with the software or on a CD- ROM. Any other use, such as any dissemination of printed copies or use of this documentation, in whole or in part, in another publication, requires the prior written consent from an authorized representative of Actian. To the extent permitted by applicable law, ACTIAN PROVIDES THIS DOCUMENTATION "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IN NO EVENT WILL ACTIAN BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USER OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF ACTIAN IS EXPRESSLY ADVISED OF SUCH LOSS OR DAMAGE. The manufacturer of this Documentation is Actian Corporation. For government users, the Documentation is delivered with "Restricted Rights" as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.227-19(c)(1) and (2) or DFARS Section 252.227-7013 or applicable successor provisions. Copyright © 2012 Actian Corporation. All Rights Reserved. Actian, Cloud Action Platform, Cloud Action Server, Action Server, Ingres, Vectorwise, OpenROAD, Enterprise Access, and EDBC are trademarks or registered trademarks of Actian Corporation. All other trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Contents Chapter 1: Introduction to Ingres Security 7 Security Features .................................................................................................................. 7 Level of Security ................................................................................................................... 8 Understanding Ingres Security Mechanisms .............................................................................. 8 Directory and File Permissions ................................................................................................ 9 User Authentication ............................................................................................................... 9 Remote Users ................................................................................................................. 9 Authorization Identifiers ....................................................................................................... 10 Subject Privileges ................................................................................................................ 10 Object Permissions .............................................................................................................. 11 Security Alarms .................................................................................................................. 11 Security Auditing ................................................................................................................ 11 Database Procedures ........................................................................................................... 11 Data at Rest Encryption ....................................................................................................... 12 Chapter 2: Understanding Directory and File Permissions 13 Directory and File Permissions .............................................................................................. 13 File Permissions on Windows ........................................................................................... 13 File Permissions on UNIX ................................................................................................ 14 Chapter 3: Security Features on UNIX 15 Ingvalidpw Program (Password Validation) .............................................................................. 15 Create Password Validation Program (UNIX) ...................................................................... 16 Ingvalidpam Program (Password Validation Through PAM) ........................................................ 16 Access Control with Setuid (UNIX) ......................................................................................... 16 Use Chmod to Set the Setuid Bit ...................................................................................... 17 Example: Refer to Setuid in an Embedded SQL Application .................................................. 18 Chapter 4: Authorizing User Access 21 Common Types of Ingres Users ............................................................................................. 21 Ingres Users and the DBA .................................................................................................... 22 How to Establish User Access ................................................................................................ 23 Users and Profiles ............................................................................................................... 23 Working with User Objects .............................................................................................. 24 Working with Profile Objects ............................................................................................ 29 Groups and Roles ................................................................................................................ 31 Groups ......................................................................................................................... 31 Contents iii Roles ........................................................................................................................... 35 Chapter 5: Assigning Privileges and Granting Permissions 39 Subject Privileges ................................................................................................................ 39 Auditor Privilege ............................................................................................................ 40 Createdb Privilege ......................................................................................................... 40 Maintain_Audit Privilege ................................................................................................. 41 Maintain_Locations Privilege ............................................................................................ 41 Maintain_Users Privilege ................................................................................................. 42 Operator Privilege .......................................................................................................... 43 Security Privilege ........................................................................................................... 44 Trace Privilege .............................................................................................................. 44 Sets of Privileges Associated with a Session ....................................................................... 45 Object Permissions .............................................................................................................. 46 Working with Grants ...................................................................................................... 47 Database Grants ........................................................................................................... 49 Table and View Grants ................................................................................................... 53 Table Grant Examples .................................................................................................... 54 Procedure Grants ........................................................................................................... 55 Database Event Grants ................................................................................................... 55 Role Grants .................................................................................................................. 55 How Grants Restrict Data Access ..................................................................................... 56 Grant Overhead .................................................................................................................. 57 Multiple Permission Checks ............................................................................................. 57 How Privileges for a Session Are Determined ..................................................................... 58 How Database Privileges for a Session Are Determined ....................................................... 60 Dbmsinfo—View Permissions for Current Session ................................................................ 61 Chapter 6: