Adds an entry to the access control list (ACL) for a database, relation, view or view. To define protection for a database, you must first invoke the database. Example: RDO> DEFINE PROTECTION FOR DATABASE cont> POSITION 3 cont> IDENTIFIER [25,235] cont> ACCESS "READ+WRITE+MODIFY+ERASE".
1 – Format
(B)0[m[4mDEFINE[m [4mPROTECTION[m FOR qqqqk x lqqqqqq<qqqqqqqqqqqqqj mqqqqwqqq> [4mDATABASE[m qqqqqqqqqqq>qqqqqqqqqqqqqqqqqk tqqq> [4mRELATION[m qq> relation-name qqqqqqqqqqqu tqqq> [4mVIEW[m qqqqqq> view-name qqqqqqqqqqqqqqqu mqqq> [4mFIELD[m q> field-name [4mIN[m relation-name qu lqqqqqqqqqqqqqqq<qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqj mqqqwqqqqqqqqqqq>qqqqqqqqqqqqqqqqqqwqk tq> [4mAFTER[m qqq> identifier qqqqqu x mq> [4mPOSITION[m qq> n qqqqqqqqqqqqj x lqqqqqqqqqqqqqqq<qqqqqqqqqqqqqqqqqqj mqqq> [4mIDENTIFIER[m qqwqq> identifier qqwqk mqq<qqqq + <qqqqqqj x lqqqqqqqqqqqqqqqqqqqq<qqqqqqqqqqqqqqqqqj mqqq> [4mACCESS[m qqqwqqq>qqqqqqqqqqqqqqqqqwqqqqqqqqqq> . mqwq> access-right qwqj mq<qqqqqq + <qqqqqj
1.1 – relation-name
The name of the Oracle Rdb relation for which you want to insert an ACL entry (ACE). A user with MODIFY rights on the relation automatically gets the same rights on all fields in the relation. However, you can restrict MODIFY rights by defining them only on specific fields you want users to be able to modify and thus remove the right from the relation entry.
1.2 – view-name
The name of the Oracle Rdb view for which you want to insert an ACL entry.
1.3 – field-name
The name of the local field in a specified relation for which you want to insert an ACL entry. Rights on a field are determined by the rights defined on the field combined with those specified for the specific relation ACL. Only MODIFY rights can be granted to fields. All other rights are not applicable.
1.4 – AFTER
Locates the new ACL entry relative to an existing entry. When you specify an identifier, Oracle Rdb searches the access control list for an existing entry that matches. It then inserts the new entry after the existing one. If you use the AFTER clause, you cannot use the POSITION clause.
1.5 – POSITION
Locates a new ACL entry relative to its position in the list. Use an unsigned integer greater than zero to specify the position in the access control list where Oracle Rdb places a newly created entry. If you use the POSITION clause, you cannot use the AFTER clause. When this statement executes, Oracle Rdb automatically reassigns sequence numbers to entries in the ACL, starting with number one.
1.6 – IDENTIFIER
Identifies the user or users for whom an entry is being added. You can specify any valid OpenVMS identifier in the identifier clause: o UIC identifier You cannot specify more than one UIC identifier in a DEFINE PROTECTION statement. o General identifier o System-defined identifier
1.6.1 – More
You can specify multiple identifiers in the identifier clause when combining an identifier with a system-defined identifier. However, you should regard the six system-defined identifiers as mutually exclusive. Do not attempt to use them in combination with each other. You can combine them with other identifiers (UICs and general identifiers). When you specify multiple identifiers, separate them with a plus sign (+). If you specify multiple identifiers in the identifier clause, you define one ACE that determines the access rights that users will receive when they hold ALL the identifiers specified in the identifier clause. Users who do not hold all of the identifiers specified in the identifier clause will not be governed by the ACE that is created. For example, the first of the two RDO statements in the following example defines a single ACE for users with both the [CLERK,DAVIES] and REMOTE identifiers, not one ACE for users with the [CLERK,DAVIES] identifier and another ACE for users with the REMOTE identifier. The second statement shows the ACE created in the second position in the ACL, as specified in the DEFINE PROTECTION statement: DEFINE PROTECTION FOR RELATION A1 POSITION 2 IDENTIFIER [CLERKS,DAVIES]+REMOTE ACCESS READ+WRITE+MODIFY. ! SHOW PROTECTION FOR RELATION A1 (IDENTIFIER=[DBS,RICK],ACCESS=READ+WRITE+MODIFY+ERASE+SHOW+DEFINE+ CHANGE+DELETE+CONTROL+OPERATOR+ADMINISTRATOR+REFERENCES+SECURITY) (IDENTIFIER=[CLERK,DAVIES]+REMOTE,ACCESS=READ+WRITE+MODIFY) (IDENTIFIER=[*,*],ACCESS=READ+MODIFY) To control which users have the ability to create databases, use the RDBVMS$CREATE_DB logical name and system rights identifier. See the "Oracle Rdb Guide to Database Design and Definition" for more information on the RDBVMS$CREATE_DB logical name and system rights identifier.
1.7 – ACCESS
Grants or denies access rights to the user identified in an ACL entry. For more information on access rights, ask for HELP on Access_rights. Specify only those access rights that you want to grant access to.
2 – More
You must have the Oracle Rdb CONTROL privilege for an object to define protection for the object using the DEFINE PROTECTION statement. An access control list (ACL) is attached to each database, relation, and view. This list defines which users can access the database element and what operations each user can perform. Thus each entry in the access control list consists of two items of information: o An identifier that specifies a user or set of users. o A set of access rights. These rights specify what operations the user or users can perform on the database or relation. When you first create a database, Oracle Rdb creates two ACL entries, one for the creator of the database and one for all other users. Under the Oracle Rdb default protection scheme, the creator of the database is given all access rights to the database, including CONTROL, which enables the owner to grant CONTROL and any other access rights to other users. All other users of the database are given no access rights to the database. For any relations or views created under the Oracle Rdb default protection scheme, the creator of the relation or view is given all the access rights to the object, including CONTROL, and all other users are given no access rights to the relation. Oracle Rdb allows you to tailor the default protection for any new relations that are created in a database: 1. By default, the creator of a relation gets all the access rights to the relation, but Oracle Rdb gives no access to any other user: RDO> SHOW PROTECTION FOR RELATION RELATION1 (IDENTIFIER=[DBS,RICK],ACCESS=READ+WRITE+MODIFY+ERASE+SHOW+DEFINE+ CHANGE+DELETE+CONTROL+OPERATOR+ADMINISTRATOR+REFERENCES) (IDENTIFIER=[*,*],ACCESS=NONE) 2. If you want other users to have some access to new relations, you can define an identifier called DEFAULT in the system rights database. Then you can define an identifier called DEFAULT for your Oracle Rdb database. The access rights specified in the DEFAULT identifier will be granted to all users except the owner of any new relations created in the database. For example: RDO> DEFINE PROTECTION FOR DATABASE cont> IDENTIFIER DEFAULT cont> ACCESS READ+MODIFY. 3. You need to detach from the database to make the change in protection occur: RDO> COMMIT RDO> FINISH 4. The protection on existing relations in the database is not changed, but any new relations that are defined receive the protection specified by the DEFAULT identifier. In this example, the creator receives all the access rights to the new relation RELATION2 and all other users receive the READ and MODIFY access rights specified by the DEFAULT identifier. RDO> INVOKE DATABASE FILENAME TEST1 RDO> RDO> DEFINE RELATION RELATION2. cont> FIELD1. cont> FIELD2. cont> END RELATION. RDO> RDO> SHOW PROTECTION FOR RELATION RELATION2 (IDENTIFIER=[DBS,RICK],ACCESS=READ+WRITE+MODIFY+ERASE+SHOW+DEFINE+ CHANGE+DELETE+CONTROL+OPERATOR+ADMINISTRATOR+REFERENCES) (IDENTIFIER=[*,*],ACCESS=READ+MODIFY) Oracle Rdb determines the rights for a user by matching the user's user identification code (UIC) with the identifier in each ACL entry. The first time Oracle Rdb finds a match, it grants the user the rights in that entry. If there is no match, Oracle Rdb grants no rights. Therefore, if the creator deletes the second default entry whose identifier is [*,*], all access is denied to all users but the creator. Use the DEFINE PROTECTION statement to add more entries to the list. When the statement executes, Oracle Rdb creates a new entry in the position specified. This entry grants the specified rights to the user or group of users determined by the identifier. All rights not specified in the statement are denied. For a particular user, Oracle Rdb grants an access right to a relation only if that right is granted in the ACL for both the database and the relation. That is, a user has WRITE privilege to the EMPLOYEES relation only if that user has WRITE privilege to both the PERSONNEL database and the EMPLOYEES relation. This means that protection at the database level should grant to each user or group of users all the privileges they may need for any relation. You can then deny these privileges at the relation level. Granting or revoking a privilege takes effect after the user detaches and attaches to the database again. To define protection for a database, you must first invoke the database. You must execute the DEFINE PROTECTION statement in a read/write transaction. If you issue this statement when there is no active transaction, Oracle Rdb starts a read/write transaction implicitly. Other users are allowed to be attached to the database when you issue the DEFINE PROTECTION statement. You must have the READ database privilege to attach to a database. The ADMINISTRATOR, OPERATOR, and SECURITY database privileges are the three Oracle Rdb role-oriented privileges. Users with these privileges have the ability to override ACLs for some objects to perform database operations. Similarly, users with certain OpenVMS privileges also have the ability to override ACLs for some database objects. The Oracle Rdb role-oriented privileges are limited to the database in which they are granted, but the OpenVMS privileges span all databases on the system. Users with the Oracle Rdb or the OpenVMS role-oriented privileges are implicitly granted other Oracle Rdb privileges. When you are granted implicit privileges to a database object as a result of an ACL override, you operate as if you actually hold the privilege, although you are not explicitly granted the privilege and it is not stored in the ACL. Users with the ADMINISTRATOR database privilege or the OpenVMS SYSPRV privilege can perform any data definition or data manipulation operation on any named object, including the database, regardless of the ACL for the object. The ADMINISTRATOR privilege is the most powerful privilege in Oracle Rdb, since it can override most privilege checks performed by Oracle Rdb. Users with the ADMINISTRATOR database privilege or the OpenVMS SYSPRV privilege implicitly receive ALL privileges for all objects, except the SECURITY and OPERATOR database privileges. Users with the OPERATOR database privilege or the OpenVMS OPER privilege implicitly receive the Oracle Rdb READ, WRITE, MODIFY, and ERASE database privileges. Users with the SECURITY database privilege or the OpenVMS SECURITY privilege implicitly receive the Oracle Rdb READ, WRITE, MODIFY, and ERASE database privileges. Users with the OpenVMS BYPASS privilege implicitly receive ALL privileges except the Oracle Rdb ADMINISTRATOR, OPERATOR, and SECURITY database privileges and the CONTROL relation privilege. Users with the OpenVMS READALL privilege receive implicit READ and SHOW database and relation privileges. You must have the DISTRIBTRAN database access right to a database to run a two-phase commit transaction on that database.
3 – Examples
Example 1 The following example grants access rights to a single user: RDO> DEFINE PROTECTION FOR DATABASE cont> POSITION 3 cont> IDENTIFIER [CLERKS,DAVIES] cont> ACCESS "READ+WRITE+MODIFY+ERASE". This statement performs the following actions: o Specifies the location of the entry within the access control list. The new entry is in the third position and all subsequent entries are moved to the next higher position. o Uses an identifier to designate the user who is granted access rights. o Grants the specified access rights. Oracle Rdb denies all other rights. Example 2 The following example grants access rights to a group of users: RDO> DEFINE PROTECTION FOR RELATION SALARY_HISTORY cont> AFTER [ANALYSTS,JOHNSON] cont> IDENTIFIER [ANALYSTS,*] cont> ACCESS cont> "READ+WRITE+MODIFY+ERASE - cont> +DEFINE+CHANGE+DELETE". This statement performs the following actions: o Names the relation SALARY_HISTORY. The new ACL entry will be applied to this relation. o Uses the AFTER clause to specify the location of the entry within the ACL. In this case, the new ACL entry appears after the entry for user identifier [ANALYSTS,JOHNSON]. o Identifies the set of users ([ANALYSTS,*]) who are granted the listed access rights. In this case, the new identifier has the same group identifier as the identifier that precedes it in the list. This means that for user JOHNSON in group ANALYSTS, Oracle Rdb will grant the privileges listed in the earlier entry. All other users in group ANALYSTS will fall through to the entry identified by [ANALYSTS,*]. Oracle Rdb grants these other members of group PROGRAMMERS the rights listed in this statement. In this way, the system gives general rights to a group and more specific rights to a single member of the group. Example 3 The following example grants access rights on the specific field to a group of users: RDO> DEFINE PROTECTION FOR FIELD SALARY_AMOUNT IN SALARY_HISTORY cont> AFTER [MANAGERS,SMITH] cont> IDENTIFIER [MANAGERS,*] cont> ACCESS MODIFY. The following examples show how to specify the identifiers in a DEFINE PROTECTION statement. Example 4 In this example, all users with the UIC matching [25,*] and running a batch job are granted the access rights listed. RDO> DEFINE PROTECTION FOR DATABASE cont> POSITION 4 cont> IDENTIFIER [25,*]+BATCH cont> ACCESS READ+DEFINE+CHANGE+DELETE. 2 Example 5 All users associated with the general identifier DATAENTRY and using RDO interactively are granted update access rights. RDO> DEFINE PROTECTION FOR DATABASE cont> POSITION 5 cont> IDENTIFIER DATAENTRY+INTERACTIVE cont> ACCESS READ+WRITE+MODIFY+STORE. Example 6 User JONES gets the specified access rights. RDO> DEFINE PROTECTION FOR DATABASE cont> POSITION 6 cont> IDENTIFIER [RDB,JONES] cont> ACCESS READ+WRITE+MODIFY+ERASE.