Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Current »

This section provides a list of security measures that are offered to protect Jethro Instances. The security measures are divided into the following categories:

Authentication

The act of verifying the identity of a user.

Authorization

The function of specifying access rights to resources and operations.

Auditing

The ability to monitor selected user actions according to a defined security policy.

Terminology

USER - An individual, identified by an underlying authentication system. A User is defined and authenticated via an external LDAP service.

GROUP - A set of one or more users. Group are defined via an external LDAP service.

OBJECT - A Jethro entity that contain other entities and/or can be access by user. Entities include: INSTANCE, SCHEMA, TABLE and VIEW.

PERMISSION - An Instruction or rule that allows access to an OBJECT by a USER. 

ROLE - A set of permissions. ROLE is identified by role name. ROLE can be applied to GROUP. The relations between ROLES and GROUP are defined within Jethro authorization model.

See Also

Setting up a Kerberos Instance

  • No labels