Scalable Database Server, HiRDB Version 8 Description
This section explains the user privileges that are set up by HiRDB. Figure 9-1 shows the HiRDB user privileges.
Figure 9-1 HiRDB user privileges
These HiRDB user privileges are granted to various users, such as HiRDB administrators, DBA privilege holders, and schema owners.
The DBA privilege is required in order to grant and revoke DBA privileges, CONNECT privileges, and schema definition privileges. It permits the following actions:
1 Operation that can be performed when using HiRDB External Data Access. For details about HiRDB External Data Access, see HiRDB External Data Access Version 8.
2 The CONNECT privilege is not needed to use the Directory Server linkage facility. For details about the Directory Server linkage facility, see Section 2.3 Linkage to directory server products.
This privilege is required for auditors. This privilege allows a user to perform the following actions:
To use the security audit facility, you need to set the audit privilege. For details about the security audit facility, see 9.2 Security audit facility.
The CONNECT privilege is required in order to use HiRDB. This privilege permits a user to connect to the database. An attempt to connect to the database by a user who does not have the CONNECT privilege results in an error.
The schema definition privilege is required in order to define a schema. This privilege permits a user to take the following actions:
* Operation that can be performed when using HiRDB External Data Access. For details about HiRDB External Data Access, see HiRDB External Data Access Version 8.
The RDAREA usage privilege is required in order to use an RDAREA. This privilege permits a user to define tables and indexes in the RDAREA to which the privilege applies. An RDAREA for which the RDAREA usage privilege is granted by specifying an authorization identifier is called a private user RDAREA, and an RDAREA for which the RDAREA usage privilege is granted by specifying PUBLIC is called a public user RDAREA.
An access privilege is required in order to access a table. Only those users who have an access privilege are allowed to access a table. Access privileges are set for each table. The types of access privilege are listed in Table 9-1.
Table 9-1 Access privilege types
Access privilege type | Explanation |
---|---|
select privilege | Allows retrieval (select) of row data from the table. |
INSERT privilege | Allows addition (INSERT) of row data to the table. |
DELETE privilege | Allows deletion (DELETE) of row data from the table. |
UPDATE privilege | Allows updating (UPDATE) of row data in the table. |
All Rights Reserved. Copyright (C) 2007, Hitachi, Ltd.