User's Guide
PART 4. Database Administration and Advanced Use
CHAPTER 22. Keeping Your Data Secure
Databases may contain information that is proprietary, confidential, or private. For this reason, it can be important to ensure that the database and the data in it are designed for security.
Adaptive Server Anywhere has several features to assist in building a secure environment for your data:
User identification and authentication These control who can gain access to a database.
For information on these subjects, see Creating new users.
Discretionary access control features These features control the actions a user is able to carry out when connected to a database.
For more information, see Database permissions overview.
Auditing By turning on auditing, you can maintain a record of actions on the database.
For more information, see Auditing database activity.
Database server options When you start the database server, you control who can carry out operations such as loading databases.
For more information, see Controlling permissions from the command line.
Views and stored procedures Views and stored procedures allow you to tune the data that a user can access and the operations a user can execute.
For more information, see Using views and procedures for extra security.
This chapter describes auditing, and collects together overviews of the other security features, providing pointers to where they are discussed in more detail.