Implementing Fine Grained Access Control and Masking

Slides:



Advertisements
Similar presentations
Banner Spreadsheet Budgeting LaSalle University
Advertisements

Chapter 4 Joining Multiple Tables
Copyright © 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification.
Tutorial EBSCOadmin User Groups support.ebsco.com.
6 th Annual Focus Users’ Conference 6 th Annual Focus Users’ Conference Profiles and User Permissions Presented by: Josh Mostyn Presented by: Josh Mostyn.
SESSION TWO SECURITY AND GROUP PERMISSIONS Security and Group Permissions.
TECHNICAL TRAINING December Quick Overview Project Sunlight requires certain New York State entities to report certain appearances by the public.
یا ذالامن و الامان. Virtual Private Database Mohammad Amin Sabbaghian.
ORACLE DATABASE SECURITY
Security and Integrity
1 System for Administration, Training, and Educational Resources for NASA Managing Access.
8 Copyright © 2004, Oracle. All rights reserved. Creating LOVs and Editors.
©2008 TTW Where “Lean” principles are considered common sense and are implemented with a passion! Product Training Cash and Cash Management.
BANNER SECURITY ILLUSTRATED USING ORACLE BASED SECURITY AND BANNER HR.
Using PII to Support Multi- College FA Processing Presented by SMCCD/SIG.
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
Copyright © 2001 by Wiley. All rights reserved. Chapter 10: Advanced Database Operations Revising Vintage Videos Setting RecordSource at run time DBGrid.
By Lecturer / Aisha Dawood 1.  Administering Users  Create and manage database user accounts.  Create and manage roles.  Grant and revoke privileges.
ORACLE LABEL SECURITY Evgeniya Kotzeva VEREO Technologies.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 6 Virtual Private Databases.
CSIS 4310 – Advanced Databases Virtual Private Databases.
Quick Tips on Banner Rich Loftus, Board of Regents Rich Loftus, Board of Regents Thu., June 2 | 2:15 PM | Avignon.
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Lecture 7 Integrity & Veracity UFCE8K-15-M: Data Management.
Administrator – Employee Overview September, 2011.
IS 221: DATABASE ADMINISTRATION Lecture 6:Create Users & Manage Users. Information Systems Department 1.
Chapter 9 Joining Data from Multiple Tables
Programming using C# Joins SQL Injection Stored Procedures
Security.
Moodle (Course Management Systems). Managing Your class In this Lecture, we’ll cover course management, including understanding and using roles, arranging.
Higher Express Banner-APEX Integration Framework
CS146 References: ORACLE 9i PROGRAMMING A Primer Rajshekhar Sunderraman
Intro to SQL Management Studio. Please Be Sure!! Make sure that your access is read only. If it isn’t, you have the potential to change data within your.
Dale Roberts 1 Department of Computer and Information Science, School of Science, IUPUI Dale Roberts, Lecturer Computer Science, IUPUI
1 Chapter 6 Database Administration. 2 Introduction Database administration The process of managing a database Database administrator A person or an entire.
IS 230Lecture 6Slide 1 Lecture 7 Advanced SQL Introduction to Database Systems IS 230 This is the instructor’s notes and student has to read the textbook.
Advanced SQL: Triggers & Assertions
1 PL\SQL Dev Templates. 2 TEMPLATE DEFINITION Whenever you create a new program unit, its initial contents are based upon a template which contains pre-defined.
POPULATION SELECTION CONCEPT People in Database Selection Rules or Criteria Selected Population of Individuals who Satisfy Rules.
Gold – Crystal Reports Introductory Course Cortex User Group Meeting New Orleans – 2011.
Views, Algebra Temporary Tables. Definition of a view A view is a virtual table which does not physically hold data but instead acts like a window into.
AR350: Maintaining Customers Welcome to AR350: Maintaining Customers.
Chapter 6 Virtual Private Databases
PeopleSoft Financials Advanced Query Training Financial Information Systems and Reporting Controller’s Division
Oracle Business Intelligence Foundation – Testing and Deploying OBI Repository.
5 Copyright © 2008, Oracle. All rights reserved. Testing and Validating a Repository.
Banner 6.x Fundamentals: Navigation and Forms. n Name n Organization n Title/function n Job responsibilities n SCT Banner Experience n Expectations Introductions.
MICROSOFT ACCESS – CHAPTER 5 MICROSOFT ACCESS – CHAPTER 6 MICROSOFT ACCESS – CHAPTER 7 Sravanthi Lakkimsety Mar 14,2016.
 CONACT UC:  Magnific training   
SAP R/3 User Administration1. 2 User administration in a productive environment is an ongoing process of creating, deleting, changing, and monitoring.
19 Copyright © 2008, Oracle. All rights reserved. Security.
More SQL: Complex Queries, Triggers, Views, and Schema Modification
Value Based Security Overview
Controlling User Access
More SQL: Complex Queries,
CollegeSource Security Application &
Custom Profile Options
Physical Changes That Don’t Change the Logical Design
Advanced SQL: Views & Triggers
Sirena Hardy HRMS Trainer
More SQL: Complex Queries, Triggers, Views, and Schema Modification
Protecting Senior Citizens from Phishing s
MBUG 2017 Session Title: Preventing/Correcting Multiple Records
Creating Noninput Items
Cash and Cash Management
Protection of Sensitive Information
Banner 9: Financial Aid Francesca Sisto Di Emidio Sr. User Liaison
and Forecasting Resources
Presentation transcript:

Implementing Fine Grained Access Control and Masking

What is FGAC? Fine Grained Access Control (FGAC) in Oracle 8i gives you the ability to dynamically attach, at runtime, a predicate (the WHERE clause) to all queries issued against a database table or view. (Expert One-on-One Oracle by Tom Kite) Other terms for FGAC are Row Level Security and Virtual Private Database (VPD). FGAC is an Oracle feature that SCT has implemented within the Banner framework.

What is FGAC cont’d FGAC can be implemented with or without Value Based Security. FGAC is implemented for specific tables, and works at both the form and table level. Masking is NOT FGAC. FGAC restricts access at the row level

Quick Overview of how FGAC works Assume FGAC has been implemented for table SPBPERS: User JSMITH has BAN_DEFAULT_M access to SPAPERS. We want him to see all people who are designated General Student on form GUASYST. To do this, we associate the SB_GENSTUDENT_PII with JSMITH. When JSMITH queries a person in SPAPERS which has an SGBSTDN record, he will see and have access to this record. If JSMITH tries to query a person which does not have an SGBSTDN record, he will get into the form but will not see anything, as if the record does not exist at all. This will carry over into SQL queries against SPBPERS. We are using FGAC on SPBPERS & GOBTPAC.

Prior to implementing FGAC: The most time consuming part for us was trying to nail down all the department heads to determine who can see what. When we explained to users that we were going to restrict access to SPBPERS data based upon job function we received feedback that certain users would need to see a cross section of records and could not be limited. To sum up, the first step is to define Business Profiles and assign users to the applicable profiles.

Implementing FGAC Step 1: GTVFBPR Create Business Groups Example: Similar to GSASECR where you can give a user direct access to a form or assign forms to security classes.

Step 2A GORFDMN Check the Enable PII box for all PII(s) to be used

Step 2B: GOAFBPI Link applicable PII(s) with Business Profiles

Step 3: GOAFBPR Assign Users to Business Profiles (This is ongoing maintenance)

Shows Business Profile Groups and associated PII Domains.

Step 4: GORFDPI 1. Make sure policies are enabled on form GORFDPI for SPBPERS and GOBTPAC and the Active Indicator is checked for these tables. Make sure the Active Indicator is unchecked for SPRIDEN.. 2. Log in as baninst1 and position in the links directory, run gfpiiaddpol.sql

Checking Exempt from PII will bypass FGAC processing for this user in all Banner Forms. FGAC will remain in place at the table level. (Defect or feature?) Checking Cross Domain PII will allow user to by pass FGAC by entering through a search Form (SOAIDEN, etc).

In order to grant full database access to certain users we created a Business Profile which has all PII Domains associated with it. This is needed for users who will need full SQL row access.

User IDs we have associated with the EXEMPT_FROM_FGA profile User IDs we have associated with the EXEMPT_FROM_FGA profile. BANINST1 is a definite along with whatever USER ID performs table builds.

Shows the predicate that is being used on each select statement issued against applicable FGAC table.

GORFEOB Job Submission process are placed here to exempt from FGAC GORFEOB Job Submission process are placed here to exempt from FGAC. FYI, Job submission jobs which call database procedures will be processed under FGAC.

Things to keep in mind If a person is not a member of a PII domain they will have zero access to the table.  All users who should have access to the table need to be added to a domain.  From here on out, when you create a Banner account for a new employee or give some access to a specific form with PII restrictions, you must add this person to an applicable domain. I added the GOAFBPR form to the GSASECR options menu, so as I give access Forms, I can then add to the Business Group. If you do a select count(*) from spbpers, you will return the total of all rows.  If you turn FGA on for spbpers and are assigned to the student domain and do a select count(*) from spbpers, you will return the total for only students.  Everyone at your institution needs to know this up front, this can be misleading for statistical purposes.  Therefore you will need to exclude certain master user accounts from all PII processing to get accurate table statistics (example BANINST1, WWW_USER). If you have customized table builds based on the FGA table, you will either need to place into above referenced exclusion group or prior to builds turn off FGA, and turn back on when finished example SCT needs to add a PII to capture people without any GUASYST records. We created our own PII to do this, will cover in the Technical presentation. Since FGAC excludes entire rows, custom queries and reports will need to be reexamined. You will want to make sure that all references to the table using FGAC be outer joined, otherwise entire rows will be excluded.

FGA Technical Creating a custom PII

FGA Technical

FGA Technical

FGA Technical

FGA Technical

FGA Technical BEGIN gokfgac.p_turn_fgac_off; Table build code gokfgac.p_turn_fgac_on; END;

Masking Masking is an SCT feature for Oracle Forms You may mask a column fully or partially (partially masking a varchar2 column requires a small form mod, will cover this in technical presentation). Masking is all or nothing. Once Masking is enabled for a user every record will be masked, unlike FGAC where you can grant access to certain records and restrictions on others. I have an RPE(#:1-G3JR6) to allow the same type of functionality for Masking. Because Masking is an Oracle Form feature, Masking will not carry over into SQL queries.

Quick Overview of how Masking works Assume spbpers_ssn has been masked on form SPAPERS for user JSMITH and he has BAN_DEFAULT_M: When JSMITH enters into SPAPERS he will be able to see all columns except SSN, which will be masked. He will be able to update all columns except SSN. Every record he queries in SPAPERS will have the SSN masked, there is no PII processing. Masking is all or nothing. Masking does not carry over into SQL, and each form a user has access to must be set up to Mask. We are masking SSN (birthdate soon) on SPAPERS, SPAIDEN, APAIDEN & APSABIO. We are using a combination of FGAC and Masking on Personal Data.

GORDMCL Here you list the Form Item/s to be Masked on a particular Form.

GORDMSK Establish Masking Rules

Masking Technical

Masking Technical

Masking Technical

Masking Technical

Masking Technical