Copyright 2007, Information Builders. Slide 1 Restricting Access To a File Walter Brengel June, 2008.

Slides:



Advertisements
Similar presentations
1 Chapter 13 Securing an Access Application. 13 Chapter Objectives Learn about the elements of security Explore application-level security Use user-level.
Advertisements

18 Copyright © Oracle Corporation, All rights reserved. Transporting Data Between Databases.
1 Noreen Redden FOCUS Users of New England 2012 MFD_PROFILE PROFILE for Your Synonym:
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Copyright 2007, Information Builders. Slide 1 Relational Efficiencies: Part II Overview and JOIN / Sort Scenarios Renee Teatro Information Builders.
Copyright 2007, Information Builders. Slide 1 Walter Brengel Information Builders New Jersey User Forum – June 2008 FOCUS to SQL DeMystified.
With Microsoft Access 2010© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Access.
The Web Warrior Guide to Web Design Technologies
Copyright 2007, Information Builders. Slide 1 Non-Relational Efficiencies Walter F. Blood Technical Director Information Builders, Inc.
Database Management System
Chapter 3: System design. System design Creating system components Three primary components – designing data structure and content – create software –
Data Sources Create a connection definition in Cognos Step 2: Create a Cognos Account on Each Data Source Step 1: Import Metadata Step 3: Publish Package.
WRITING BASIC SQL SELECT STATEMENTS Lecture 7 1. Outlines  SQL SELECT statement  Capabilities of SELECT statements  Basic SELECT statement  Selecting.
8 Copyright © 2004, Oracle. All rights reserved. Creating LOVs and Editors.
1 JOIN: Rules, Roles, and Conventions Floria Foote June 2008.
PHP Programming with MySQL Slide 8-1 CHAPTER 8 Working with Databases and MySQL.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
Cao Tiến Đức. Outline What is TDE How TDE works Basic TDE operations Tablespace encryption HSM Reference.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Dinamic SQL & Cursor. Why Dinamic SQL ? Sometimes there is a need to dynamically create a SQL statement on the fly and then run that command. This can.
Module 9 Designing and Implementing Stored Procedures.
TxEIS Security A role-based solution October 2010.
Introduction to the Adapter Server Rob Mace June, 2008.
Objectives After completing this lesson, you should be able to do the following: Describe each data manipulation language (DML) statement Insert rows.
Oracle 11g DATABASE DEVELOPMENT LAB1. Introduction  Oracle 11g Database:-  Oracle 11g database is designed for some features, which helps to the organizations.
Open Source Server Side Scripting ECA 236 Open Source Server Side Scripting PHP & MySQL.
Module 4 Designing and Implementing Views. Module Overview Introduction to Views Creating and Managing Views Performance Considerations for Views.
1 The Master That Tells All Floria Foote Information Builders June 2008.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
©Colin Jamison 2004 Shell scripting in Linux Colin Jamison.
1 © 2000 John Urrutia. All rights reserved. Session 5 The Bourne Shell.
PL/SQLPL/SQL Oracle11g: PL/SQL Programming Chapter 9 Database Triggers.
Copyright 2007, Information Builders. Slide 1 Hidden Gems Walter F. Blood Technical Director Information Builders, Inc.
8 Chapter Eight Server-side Scripts. 8 Chapter Objectives Create dynamic Web pages that retrieve and display database data using Active Server Pages Process.
Learningcomputer.com SQL Server 2008 –Views, Functions and Stored Procedures.
JOIN Syntax and Techniques Noreen Redden Information Builders Copyright 2011, Information Builders. Slide 1.
1 Copyright © Oracle Corporation, All rights reserved. Writing Basic SQL SELECT Statements.
Declaring PL/SQL Variables
SQL Server 2012 Session: 1 Session: 12 Triggers Data Management Using Microsoft SQL Server.
Copyright 2007, Information Builders. Slide 1 TABLE FILE: The Basics Noreen Redden FOCWizard June, 2008.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
Copyright 2007, Information Builders. Slide 1 Cesare Petrizio June, 2008 The File Is Too Large.
Session 11: Cookies, Sessions ans Security iNET Academy Open Source Web Development.
MICROSOFT ACCESS – CHAPTER 5 MICROSOFT ACCESS – CHAPTER 6 MICROSOFT ACCESS – CHAPTER 7 Sravanthi Lakkimsety Mar 14,2016.
SQL Triggers, Functions & Stored Procedures Programming Operations.
MySQL Tutorial. Databases A database is a container that groups together a series of tables within a single structure Each database can contain 1 or more.
Copyright © 2016 Ramez Elmasri and Shamkant B. Navathe.
Linux Administration Working with the BASH Shell.
In this session, you will learn to: Create and manage views Implement a full-text search Implement batches Objectives.
1 Copyright © 2009, Oracle. All rights reserved. Retrieving Data Using the SQL SELECT Statement.
Views / Session 3/ 1 of 40 Session 3 Module 5: Implementing Views Module 6: Managing Views.
DAY 20: ACCESS CHAPTERS 5, 6, 7 Larry Reaves October 28,
1 Copyright © 2004, Oracle. All rights reserved. Retrieving Data Using the SQL SELECT Statement.
19 Copyright © 2008, Oracle. All rights reserved. Security.
TK1924 Program Design & Problem Solving Session 2011/2012
Controlling User Access
Retrieving Data Using the SQL SELECT Statement
Dealing with External Data
Microsoft Office Access 2010 Lab 2
Physical Changes That Don’t Change the Logical Design
ATS Application Programming: Java Programming
Writing Basic SQL SELECT Statements
PHP: Security issues FdSc Module 109 Server side scripting and
Microsoft Office Access 2003
Oracle9i Developer: PL/SQL Programming Chapter 8 Database Triggers.
Prof. Arfaoui. COM390 Chapter 9
IST 318 Database Administration
Producing Readable Output with iSQL*Plus
Introduction to Bash Programming, part 3
Presentation transcript:

Copyright 2007, Information Builders. Slide 1 Restricting Access To a File Walter Brengel June, 2008

Copyright 2007, Information Builders. Slide 2 Restricting Access to a File AGENDA  DBA  What Is It?  How To Implement?  Limitations  DBA File  FILTERs  How They Differ From DBA  How To Use  Dynamic Filtering

Copyright 2007, Information Builders. Slide 3 Restricting Access to a File WebFOCUS/FOCUS SECURITY  Any Data Source Can Be Protected For Reporting.  Implemented With The DBA Attributes In MFD, And SET PASS = PASSWORD.  Coded In The Master File Description Or Focus Synonym (MFD). FILENAME = PERS, SUFFIX = FILE TYPE,$ … END DBA=DBAVALUE,$ USER=USER,ACCESS=ACCESS RIGHTS, $  Limits The Records That A User Can Read Or Update In A File/Table.  Can Be Used As The Only Security Or Supplement Existing Security (Such As RACF).

Copyright 2007, Information Builders. Slide 4 Restricting Access to a File WebFOCUS/FOCUS Security  DBA Security Specifies :  The Password For The Database Administrator, With Unlimited Access To The Data Source.  Password Used To Encrypt/Decrypt The Master File.  The Password(s) Of FOCUS Users Granted Access To A Data Source. The DEFAULT Password Of A User Upon Entering FOCUS/WEBFOCUS Is Blank (‘ ‘).  User Password Information Contains:  The Type Of Access The User Is Granted.  Restrictions On That Data  The Segments And Fields User Is Not Permitted To Retrieve.  Values Which Become Automatic ‘Filters’ On The Data.

Copyright 2007, Information Builders. Slide 5 Restricting Access to a File WebFOCUS/FOCUS Security DBA=JONESABC,$ USER=SUPER,ACCESS=RW, $ USER= ‘ ‘,ACCESS=R,RESTRICT=VALUE, NAME=SYSTEM,VALUE=RECORDLIMIT EQ 50,$ USER=HR,ACCESS=R,RESTRICT=SEGMENT, NAME=FUNDTRAN,$ USER=MISAdmin, ACCESS=W, RESTRICT=VALUE, NAME=SALTEST, VALUE=INCREASE+SALARY GE SALARY,$ ACCESS=R, RESTRICT=VALUE, NAME=SYSTEM,VALUE=DEPARTMENT EQ ‘MIS’,$

Copyright 2007, Information Builders. Slide 6 Restricting Access to a File WebFOCUS/FOCUS Security Data Base Administrator - DBA=JONESABC,$  Every Data Source Having Access Limits Must Have A DBA.  Groups Of Cross-referenced Data Sources (Or Files To Be Combined Together), Must Have The Same DBA Value.  Partitioned FOCUS/XFOCUS Data Sources, Which Are Read Together In The Use Command Or Through An Access File Must Have The Same DBA Value.  The DBA Has Unlimited Access To The Data Source And All Cross- referenced Data Sources  You Cannot Encrypt And Decrypt Master Files Or Restrict Existing Data Sources Without The DBA Password.

Copyright 2007, Information Builders. Slide 7 Restricting Access to a File WebFOCUS/FOCUS Security USER Access to Data USER = name  Name Is A Password Of Up To 64 Characters For The User. The Password Can Include Special Characters.  If The Password Contains Blanks, It Must Be Enclosed In Single Quotation Marks.  Passwords Are Case Sensitive  SET DBACSENSITIV = ON Or Case Insensitive  SET DBACSENSITIV = OFF

Copyright 2007, Information Builders. Slide 8 Restricting Access to a File WebFOCUS/FOCUS Security Non-Overridable User Passwords  SET PERMPASS = password  The PERMPASS Parameter Establishes A User Password That Remains In Effect Throughout A Session Or Connection.  The User Cannot Issue The SET PASS or SET USER Command To Change To A User Password With Different Security Rules. Any Attempt To Do So Generates The Following Message: Permanent PASS Is In Effect. Your PASS Will Not Be Honored. VALUE WAS NOT CHANGED  FOCUS Passwords May Be Set In MVS Via The FOCUSID Exit, Which Sets The User Password Based On RACF/ACF2/TOP SECRET Or Customer Specific Rules.  Returned Passwords Of 8 Characters Are Non-overridable.  Returned Passwords Of Less Than 8 Characters Ending In. (Period) Are Non-overridable.

Copyright 2007, Information Builders. Slide 9 Restricting Access to a File WebFOCUS/FOCUS Security ACCESS attribute USER=password, ACCESS=RW,$  ACCESS=R Read-Only (TABLE/TABLEF/MATCH FILE)  ACCESS=W Write Only (MODIFY/MAINTAIN)  ACCESS=RW Read/Write (All FOCUS Commands)  ACCESS=U Update Only (MODIFY/MAINTAIN, But No New Records/Rows Will Be Included).

Copyright 2007, Information Builders. Slide 10 Restricting Access to a File WebFOCUS/FOCUS Security RESTRICT attribute USER=name, ACCESS=access, RESTRICT=level, NAME=levelname,[VALUE=test],$  FIELD - Specifies That The User Cannot Access The Named Fields  SEGMENT - Specifies That The User Cannot Access The Named Segments  PROGRAM - Specifies That The Program Named With The NAME Parameter Will Be Called Whenever The User Uses The Data Source.  SAME - Specifies That The User Has The Same Restrictions As The User Named In The NAME Parameter.  Noprint - Specifies That The Field Named In The Name Parameter Can Be Mentioned In A Request Statement, But Will Show Default Values Of Blank Or Zero. This Option Is Not Supported With Relational Data Sources.

Copyright 2007, Information Builders. Slide 11 Restricting Access to a File WebFOCUS/FOCUS Security RESTRICT=VALUE,NAME=name,VALUE=test  ACCESS=R  NAME = SYSTEM - The Test Specified In VALUE Will Be Applied For Any Report Request Against The File.  NAME = segname - The Test Specified In VALUE Will Be Applied For Any Report Request That Requires The Segment Named.  VALUE = test - Generates IF Test, So Must Be Of The Form: field relation value [OR value …]

Copyright 2007, Information Builders. Slide 12 Restricting Access to a File WebFOCUS/FOCUS Security RESTRICT=VALUE,NAME=name,VALUE=test  ACCESS=W  NAME=segname - The Test Is Applied Prior To Any UPDATE / INCLUDE At That Segment Level  NAME=testname - The Test Is Applied At Transaction Input As A “Global” VALIDATE  VALUE= test - Becomes VALIDATE Name/I1 = Testname; Return Of 0 Fails The Validation, Anything Else Passes.

Copyright 2007, Information Builders. Slide 13 Restricting Access to a File WebFOCUS/FOCUS Security DBAFILE - Security Information in a Central Master File  DBAFILE Attribute Places All Passwords And Restrictions For Multiple Master Files In One Central File.  Each Individual Master File Points To This Central Control File.  Groups Of Master Files With The Same DBA Password May Share A Common DBAFILE Which Itself Has The Same DBA Password. Benefits:  Passwords Only Have To Be Stored Once When They Are Applicable To A Group Of Data Sources  Data Sources With Different User Passwords Can Be JOINed or COMBINEd With Applicable Passwords Implemented.

Copyright 2007, Information Builders. Slide 14 Restricting Access to a File WebFOCUS/FOCUS Security FILE=filename … END DBA=dbaname, DBAFILE=filename,$ Where: dbaname Is the same as the dbaname in the central file. filename Is the name of the central file.

Copyright 2007, Information Builders. Slide 15 Restricting Access to a File WebFOCUS/FOCUS Security FILENAME=EMPLOYEE,SUFFIX=FOC,$ …. END DBA=JONESABC, DBAFILE=DBAF4,$ EMPLOYEE MASTER FILENAME=JOBFILE,SUFFIX=FOC,$ …. END DBA=JONESABC, DBAFILE=DBAF4,$ JOBFILE MASTER FILENAME=EDUCFILE,SUFFIX=FOC,$ …. END DBA=JONESABC, DBAFILE=DBAF4,$ EDUCFILE MASTER

Copyright 2007, Information Builders. Slide 16 Restricting Access to a File WebFOCUS/FOCUS Security FILENAME=DBAF4,SUFFIX=FOC,$ SEGNAME=ONE,SEGTYPE=S1 FIELD=DUMMY,,A1,$ END DBA=JONESABC,$ USER=ADMIN,ACCESS=R,$ USER=ADMIN2,ACCESS=R,$ USER=SUPER,ACCESS=RW,$ USER=,ACCESS=R,RESTRICT=VALUE, NAME=SYSTEM,VALUE=RECORDLIMIT EQ 50,$ FILENAME=JOBFILE,$ USER=JOBADMIN,ACCESS=W,$ FILENAME=EDUCFILE,$ USER=EDADMIN,ACCESS=W,$ DBAF4 MASTER

Copyright 2007, Information Builders. Slide 17 Restricting Access to a File WebFOCUS/FOCUS Security  Limitations  ACCESS = R Must Be “IF” field relation value [OR value…]  ACCESS = W Must Be Phrased As Boolean (True/False) Expression For Validate.  MASTER Must Be Encrypted Or All DBA Is Viewable  Changes To MFD’s Are Not Always Possible  Large Number Of Restrictions Becomes Difficult  Alternatives  IF Rule May Be Avoided With DEFINE In MASTER, And VALUE Restriction On DEFINE Field  For Security WITHOUT A MFD Change, Use FILTER FILE

Copyright 2007, Information Builders. Slide 18 Restricting Access to a File WebFOCUS/FOCUS Security RESTRICT=VALUE,NAME=TEST, ACCESS=NAME= RWDEPARTMENT EQ ‘MIS’ RRECORDLIMIT EQ 10 WRECORDLIMIT EQ 10 WCSAL * 1.10 LE RCSAL * 1.10 LE WDEPARTMENT EQ ‘MIS’ AND CSAL GT RDEPARTMENT EQ ‘MIS’ AND CSAL GT VALID INVALID VALID INVALID

Copyright 2007, Information Builders. Slide 19 Restricting Access to a File FILTER FILE  Restricts Access To Data Without Specifying Rules In The Master File.  DEFINITIONS At File Containing If Or Where Criteria.  Each “Filter” Can Be Activated Or Deactivated.  Active “Filters” Are In Effect For Any Request Against A File.  Can Be Built Within The Session, Or As Part Of Profile Processing For Dynamic Restrictions.  May Use &Variables For Selection Of Security

Copyright 2007, Information Builders. Slide 20 Restricting Access to a File WebFOCUS/FOCUS Security Syntax: FILTER FILE filename [CLEAR|ADD] [filter-defines;] NAME=filtername1 [,DESC=text] Where or if phrases. NAME=filternamen [,DESC=text] Where or if phrases END

Copyright 2007, Information Builders. Slide 21 Restricting Access to a File WebFOCUS/FOCUS Security FILTER ACTIVATION SET FILTER= {*|xx[ yy zz]} IN file {ON|OFF} Where: * Specifies ALL Filters For Specified Source xx yy zz Named Filters For Specified Source ON/OFF Activates Or Deactivates Specified Filter(s)

Copyright 2007, Information Builders. Slide 22 Restricting Access to a File WebFOCUS/FOCUS Security Example FILTER FILE EMPDATA INCREASE/D7 = IF CJC EQ ‘B01’ THEN.20 ELSE 0; NAME=TEST1, WHERE INCREASE + SALARY GT SALARY; NAME= MIS, IF DEPARTMENT EQ ‘MIS’ END SET FILTER = TEST1 IN EMPDATA ON

Copyright 2007, Information Builders. Slide 23 Restricting Access to a File WebFOCUS/FOCUS Security Special Considerations  FILTER Are Valid For The Structure At The Time The FILTER FILE Is Issued.  JOIN Will Clear All Filters Declared For Host File Prior To The Join  JOIN CLEAR Will Clear All FILTERS Declared For Host File AFTER The JOIN Was Issued.  SET KEEPFILTERS=On  Will Retain Filters Regardless Of Join  Active Filters For A Cross-referenced File Are In Effect, And Need Not Be Declared For The JOIN Structure.

Copyright 2007, Information Builders. Slide 24 Restricting Access to a File WebFOCUS/FOCUS Security Dynamic Filters USERID WHERETEST WHERE RECORDLIMIT EQ 5 HR1 WHERE (CSAL * 1.1) LE HR2 WHERE DEPARTMENT EQ 'MIS' AND CSAL GT MIS WHERE DEPARTMENT EQ 'MIS' NEWEMP WHERE HIRE_DATE GE ' ' SUPER WHERE DEPARTMENT NE ' ' U1 WHERE EMP_ID EQ &USERID FILE=SECURITY,SUFFIX=FOC, SEGNAME=ONE,SEGTYPE=S0 FIELD=USERID,,A8,$ FIELD=WHERETEST,,A80,$ END DBA=________,$

Copyright 2007, Information Builders. Slide 25 Restricting Access to a File FOCPARM/EDASPROF -SET &USERID = GETUSER(‘A8’); FILEDEF SCE DISK SCE.FEX -SET &USERID1 = IF &USERID EQ ‘IBIWXB’ THEN ‘SUPER’ - ELSE IF &USERID EQ ‘IBICJP’ THEN ‘MIS’ ELSE ‘ ‘; SET PASS=________ TABLE FILE SECURITY PRINT WHERETEST WHERE USERID EQ ‘USERID1’ ON TABLE SAVE AS SCE END -RUN SET PASS = ‘ ‘ FILTER FILE EMPDATA NAME=SECURITY, -INCLUDE SCE END SET FILTER =SECURITY IN EMPDATA ON

Copyright 2007, Information Builders. Slide 26 Restricting Access to a File USERID = IBIWXB (SUPER) EMP_ID DEPARTMENT LAST_NAME FIRST_NAME PRODUCTION STEVENS ALFRED MIS SMITH MARY MIS JONES DIANE PRODUCTION SMITH RICHARD PRODUCTION BANNING JOHN PRODUCTION IRVING JOAN PRODUCTION ROMANS ANTHONY MIS MCCOY JOHN MIS BLACKWOOD ROSEMARIE PRODUCTION MCKNIGHT ROGER MIS GREENSPAN MARY MIS CROSS BARBARA

Copyright 2007, Information Builders. Slide 27 Restricting Access to a File USERID = IBINMR (‘ ‘) PAGE 1 EMP_ID DEPARTMENT LAST_NAME FIRST_NAME PRODUCTION STEVENS ALFRED MIS SMITH MARY MIS JONES DIANE PRODUCTION SMITH RICHARD PRODUCTION BANNING JOHN

Copyright 2007, Information Builders. Slide 28 Review  DBA  What Is It?  How To Implement?  Limitations  DBA File  FILTERs  How They Differ From DBA  How To Use  Dynamic Filtering

Copyright 2007, Information Builders. Slide 29 Questions