Database Management System: Chapter 24: Database Security (Part 2)
Database Management System: Chapter 24: Database Security (Part 2)
The first restriction is intuitive and enforces the obvious rule that no
subject can read an object whose security classification is higher than
the subject’s security clearance.
Its basic notion is that privileges and other permissions are associated
with organizational roles, rather than individual users.
Roles can be created using the CREATE ROLE and DESTROY ROLE
commands. The GRANT and REVOKE commands can then be used to
assign and revoke privileges from roles, as well as for individual
users when needed
Role-Based Access Control
For example,
a company may have roles such as sales account manager, purchasing agent,
mailroom clerk, department manager, and so on. Multiple individuals can be
assigned to each role.
Security privileges that are common to a role are granted to the role name,
and any individual assigned to this role would automatically have those
privileges granted.
Role-Based Access Control
Two roles are said to be mutually exclusive if both the roles cannot
be used simultaneously by the user.
Mutual exclusion of roles can be categorized into two types,
1. authorization time exclusion (static)
two roles that have been specified as mutually exclusive cannot be part of a
user’s authorization at the same time
2. runtime exclusion (dynamic)
both these roles can be authorized to one user but cannot be activated by the
user at the same time
Role-Based Access Control
Defining a role hierarchy involves choosing the type of hierarchy and the
roles, and then implementing the hierarchy by granting roles to other roles.
Role hierarchy can be implemented in the following manner:
GRANT ROLE full_time TO employee_type1
GRANT ROLE intern TO employee_type2
The above are examples of granting the roles full_time and intern to two types
of employees.
Role-Based Access Control
Using an RBAC model is a highly desirable goal for addressing the key
security requirements of Web-based applications.
Roles can be assigned to workflow tasks so that a user with any of the
roles related to a task may be authorized to execute it and may play a
certain role only for a certain duration.
Role-Based Access Control
These features are lacking in DAC and MAC models. In addition, RBAC models
include the capabilities available in traditional DAC and MAC policies.
Easier deployment over the Internet has been another reason for the success
of RBAC models.
Summary