Home  >  Article  >  Database  >  Security, integrity and authorization in DBMS

Security, integrity and authorization in DBMS

WBOY
WBOYforward
2023-08-25 12:49:02874browse

DBMS 中的安全性、完整性和授权

Database Security There are many different levels of database security, but the key aspects are:

Authentication

User authentication is to ensure The person accessing the database is himself. Claims to be. Authentication can be done at the operating system level or even at the database level itself. Many authentication systems (such as retinal scanners or biometrics) are used to ensure that unauthorized persons cannot access the database.

Authorization

Authorization is the permission provided by the database administrator. Users of the database can only view content they are authorized to view. The rest of the database is beyond their scope.

The different permissions available for authorization are:

  • Primary permissions - strong> This permission is granted publicly and directly to the user.
  • Auxiliary Permissions - This permission is granted to the group and automatically granted to the user if the user is a member of the group.
  • Auxiliary Permissions - This permission is granted to the group and automatically granted to the user if the user is a member of the group. li>
  • Public Permissions - This is publicly granted to all users.
  • Context Sensitive Permissions -This relates to sensitive content and is only granted to selected users.

The authorization categories that can be granted to users are:

  • System Administrator - This is the user's highest administrative authority. Users with this permission can also perform some database administrator commands, such as restoring or upgrading the database.
  • System Control - This is the user's highest control authority. This allows maintenance operations on the database, but no direct access to the data.
  • System Maintenance - This is the lower level of system control permissions. It also allows users to maintain databases within a database manager instance.
  • System Monitoring - With this permission, the user can monitor the database and take snapshots of it.
  • System Monitoring- li>

Database Integrity

Data integrity in the database refers to the correctness, consistency and completeness of the data . Data integrity is enforced using the following three integrity constraints:

  • Entity Integrity - This is related to the concept of primary keys. All tables should have their own primary key, which should uniquely identify a row and cannot be NULL.
  • Referential Integrity - This has to do with the concept of foreign keys. A foreign key is a key to a relationship that is referenced within another relationship.
  • Domain Integrity - This means that all columns in the database should have a defined domain.

The above is the detailed content of Security, integrity and authorization in DBMS. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:tutorialspoint.com. If there is any infringement, please contact admin@php.cn delete