Naming convention for Database Services at CERN

Slides:



Advertisements
Similar presentations
MySQL Access Privilege System
Advertisements

13 Copyright © Oracle Corporation, All rights reserved. Controlling User Access.
Tux2 Database The Architecture of Our System © Juhani Välimäki 2005.
Dale Roberts 1 Department of Computer and Information Science, School of Science, IUPUI Dale Roberts, Lecturer Computer Science, IUPUI
System Administration Accounts privileges, users and roles
Backup The flip side of recovery. Types of Failures Transaction failure –Transaction must be aborted System failure –Hardware or software problem resulting.
Oracle8 - The Complete Reference. Koch a& Loney1 By What Authority? Presented by Victor Matos.
DT211 Stage 2 Databases Lab 1. Get to know SQL Server SQL server has 2 parts: –A client, running on your machine, in the lab. You access the database.
Administering User Security
Database Management System LICT 3011 Eyad H. Elshami.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Getting Started with Oracle11g Abeer bin humaid. Create database user You should create at least one database user that you will use to create database.
Oracle Database Security …from the application perspective Martin Nystrom September 2003.
Oracle Database Administration
Oracle for Software Developers. What is a relational database? Data is represented as a set of two- dimensional tables. (rows and columns) One or more.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Chapter Oracle Server An Oracle Server consists of an Oracle database (stored data, control and log files.) The Server will support SQL to define.
Mass user creation On our servers is used the convention, that each of user has only one database, which has the same name, as the user itself. This method.
9 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
Copyright س Oracle Corporation, All rights reserved. 14 Controlling User Access.
To Presentation on SECURITY By Office of the A.G. (A&E) Punjab, Chandigarh.
INTRODUCTION TO ORACLE Lynnwood Brown System Managers LLC End User Management – Lecture 3 Copyright System Managers LLC 2007 all rights reserved.
7 Copyright © 2004, Oracle. All rights reserved. Administering Users.
Controlling User Access. Objectives After completing this lesson, you should be able to do the following: Create users Create roles to ease setup and.
Anton TopurovIT-DB 23 April 2013 Introduction to Oracle2.
4BP1 Electronic & Computer Engineering Paul Gildea th Year Interim Project Presentation.
Roles & privileges privilege A user privilege is a right to execute a particular type of SQL statement, or a right to access another user's object. The.
Dale Roberts 1 Department of Computer and Information Science, School of Science, IUPUI Dale Roberts, Lecturer Computer Science, IUPUI
Controlling User Access Fresher Learning Program January, 2012.
CERN IT Department CH-1211 Genève 23 Switzerland t Application security (behind Oracle roles and profiles) Miguel Anjo 8 th July 2008 Database.
Controlling User Access. 2 home back first prev next last What Will I Learn? Compare the difference between object privileges and system privileges Construct.
Permissions Lesson 13. Skills Matrix Security Modes Maintaining data integrity involves creating users, controlling their access and limiting their ability.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Copyright © 2004, Oracle. All rights reserved. CONTROLLING USER ACCESS Oracle Lecture 8.
Kansas State University Department of Computing and Information Sciences CIS 560: Database System Concepts Tuesday, November 1, 2000 “Transaction processing”
Altering Tables and Constraints Database Systems Objectives Add and modify columns. Add, enable, disable, or remove constraints. Drop a table. Remove.
IST 318 Database Administration Lecture 9 Database Security.
Chapter 13Introduction to Oracle9i: SQL1 Chapter 13 User Creation and Management.
Oracle 11g: SQL Chapter 7 User Creation and Management.
13 Copyright © Oracle Corporation, All rights reserved. Controlling User Access.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
1 Copyright © 2006, Oracle. All rights reserved. Controlling User Access ( 사용자 접근 제어 )
7 Copyright © 2007, Oracle. All rights reserved. Administering User Security.
1 Chapters 21, 22, 23, 37  Ch. 21: SQL*Loader  Ch. 22: Database Links, Oracle Net  Ch. 23: Materialized Views (aka Snapshots)  Ch. 37: Data Dictionary.
1 Copyright © 2009, Oracle. All rights reserved. Controlling User Access.
Dr. Chen, Oracle Database System (Oracle) 1 Chapter 7 User Creation and Management Jason C. H. Chen, Ph.D. Professor of MIS School of Business Gonzaga.
8 Copyright © 2005, Oracle. All rights reserved. Managing Schema Objects.
Oracle for Physics Services and Support Levels Maria Girone, IT-ADC 6 April 2005.
15 Copyright © Oracle Corporation, All rights reserved. Managing Users.
Copyright  Oracle Corporation, All rights reserved. 14 Controlling User Access.
1 Chapters 19 and 20  Ch. 19: By What Authority? Users Roles Grant and revoke Synonyms  Ch. 20: Changing the Oracle Surroundings Indexes Clusters Sequences.
IS232 Lab 9. CREATE USER Purpose: Use the CREATE USER statement to create and configure a database user, which is an account through which you can log.
6 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
WholeSale Model 10. WholeSale Model This feature enables the Nomadix device to act as an L2TP Access Concentrator (LAC) and initiate single or multiple.
Controlling User Access
Controlling User Access
Oracle structures on database applications development
Controlling User Access
Objectives User access Create users Create roles
TABLES AND INDEXES Ashima Wadhwa.
Controlling User Access
IS221: Database Management
Database Security.
Using SQL Server through Command Prompt
Database Security OER- Unit 1-Authentication
PHPMyAdmin.
Session #, Speaker Name Database Privileges 11/29/2018.
אבטחת נתונים בסביבת SQL Data Security
Overview of features for new and returning users
Create New User in Database. First Connect the System.
Presentation transcript:

Naming convention for Database Services at CERN Aim: help account management Allow experiments and users prepare apps Restrictions: Max identifier length 30 characters Identifier -> tables, usernames, tablespaces, etc.

Project name Prefixed with experiment name ALICE_, ATLAS_, CMS_,LHCB_ Maximum of 18 characters (better max 15) BOOKKEEPING (11), TRANSFERMNGM (12), PIXEL_DT (8)... Use 6 letters for prefix (we could change to 3 letters: AL_, AT_, CM_, LH_) Use 6 letters suffix -> _READ, _WRITE, _DEV, _DATA, _INDX... Remaining 18 for project name

Usernames Integration _OWNER Same privileges as developer _WRITE Granted with insert/update/delete privileges Can create views/synonyms _READ Granted with select privileges - Example: CMS_TRACKER_OWNER, CMS_TRACKER_WRITER, CMS_TRACKER_READER - Development - Example: ATLAS_MUON_DT_DEV, ATLAS_MUON_DT_MANJO - Could have also _UPDATE user, if requested. Privileges for insert, update, delete are given by the application owner. - We can not use _DEV if using _<NICE>. Really only for development purposes. _DEV Only one account needed/requested _DEV_<NICE> More than one account needed for same project

Tablespaces - Integration, production _DATA For tables/views etc _INDX For indexes _<others> If needed for special datatypes (eg. BLOBS) - Example: CMS_TRACKER_DATA, CMS_TRACKER_INDX - Development DATA01 (shared for all users) data INDX01 (shared for all users) indexes

Connection string Production One service_name per project With 10g client: EZ connect: user@host:port/service_name Example: lhcb_book_reader@pdb01/lhcb_book.cern.ch With tnsnames entry: LHCB_BOOK = (DESCRIPTION = (ADDRESS = (PROTOCOL = TCP)(HOST = pdb01.cern.ch)(PORT = 1521)) (CONNECT_DATA = (SERVER = DEDICATED) (SERVICE_NAME = lhcb_book.cern.ch) )

Users roles and profiles Development (_DEV, _OWNER) Password changes 10 sessions max Can create all objects Application (_READER, _WRITER) No limit of sessions Can only create views synonyms Have to be granted to objects