Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

Chapter 7. Data encryption > Managing passwords - Pg. 229

call_code call_descr res_dtime res_descr we were w if nece L Order placed one month ago (6/7) not received. 1998-07-07 10:30 Checked with shipping (Ed Smith). Order sent yesterday- aiting for goods from ANZ. Next time will call with delay ssary. 7 row(s) retrieved. Database closed. 7.6 Managing passwords In this section we discuss and describe several approaches for managing passwords. 7.6.1 General password usage You might use a common password established with the SET ENCRYPTION PASSWORD statement, or you might specify the password separately for each encrypted column. If you specify the password separately for each column, you can use different passwords for each column or group of columns. If you have a SET ENCRYPTION PASSWORD in effect, a password in a SQL statement overrides the more global password. If you provide no password and have no SET ENCRYPTION PASSWORD in effect, you will get an error. 7.6.2 The number and form of passwords Encryption passwords are a difficult subject, as passwords are for most people. One needs to balance the simplicity of a single password for all the data against the difficulty of remembering multiple passwords and when each of them applies. First, consult your corporate security standards regarding the form (such as the number of characters and special characters) of passwords, and abide by those rules. IDS has only one requirement and that is a password must be at least six but not more than 128 characters. There are no rules for such things as starting or ending characters, required alphabetic, or numeric or special characters. Chapter 7. Data encryption 229