Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

CHAPTER 15: Security-Related Issues > Mapping an End User to a Database User

Mapping an End User to a Database User

An end user ultimately has to connect to the database as some database user to perform operations. This section explores the various alternatives of providing this mapping between the application end user and database end user, and examines the design implications of each alternative. For the discussion in this section, assume that we're designing an HR application that has the following two categories (or roles) of end users:

  • clerk_role: This user can generate reports and query data.
  • manager_role: This user has the privileges of clerk_role and can also add, update, and delete data.

Also assume that there are 100 clerk end users (clerk1, clerk2, etc., up to clerk100) and 10 manager end users (manager1, manager2, etc., up to manager10).


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint