Hi Dan,
Thanks for your responses. Some more comments follow inline...
Daniel John Debrunner wrote:
Rick Hillegas wrote:
Missing privileges specific to a particular database:
- Shutdown that Database
- Encrypt that database
- Upgrade database
I assume that when in SQL authorization mode these three should, by
default, be limited to the database owner. I guess today with 10.2
there is no such limitation in place. If that restriction was
enforced, would there be any demand for the ability to grant the
permission to other users?
Right, I think that by default these powers should be restricted to the
database owner. I also am having a hard time imagining why you would
want more than one person wielding these powers at any one time. The
only GRANT scenario I can think of, off the top of my head, would be
transferring these powers to a successor when the dba moves on to
another job. That case could probably be handled by telling users to set
up a special dba account for managing the application.
Thanks for bringing up these issues. They suggest that GRANT/REVOKE
might be overkill for authorizing these powers.
- Create (in that Database) Java Plugins (currently
Functions/Procedures, but someday Aggregates and VTIs)
Can you explain what this means, what security issue are you trying to
address?
I'm concerned about being able to exploit security holes in code not
supplied by Derby or the application. For instance, security holes in
the jdk classes or in other applications hosted on the same vm.
Regards,
-Rick
Dan.