Department of Computer Information Systems KEMU
|
|
- Owen Tucker
- 5 years ago
- Views:
Transcription
1 Advanced DBMS: CISY 423 Department f Cmputer Infrmatin Systems KEMU Database Security OBJECTIVES Database Security and Authrizatin Database Users Creating Users/Accunts in cmmercial DBMS Discretinary Access Cntrl Subject-Based Security Object-Based Security Mandatry Access Cntrl The SQL GRANT and REVOKE Statements Security under Shared MS Access databases Database Security and Authrizatin Three very brad issues in DB security: 1. Legal and Ethical cnsideratins - Wh has the right t read What infrmatin? 2. Plicy issues - Wh shuld enfrce security (gvernment, crpratins)? 3. System-Level issues - Where shuld security be enfrced in the system and Hw? As database practitiners, we must prvide a means f preventing unauthrized use f data in a database. Three areas are cnsidered: 1. Access Cntrl: Wh shuld be allwed access t which databases. This is typically enfrced using system level accunts with passwrds. 2. We will investigate: 1. Discretinary Access Cntrl 2. Mandatry Access Cntrl 3. Authrizatin: fr the purpses f: Reading Data - Such as reading anther emplyee's salary (using a SELECT statement fr example). Writing Data - Such as changing a value in a database (using UPDATE r DELETE). 4. Statistical Infrmatin: Enfrcing wh shuld be allwed access t infrmatin derived frm underlying databases (Census example). Here we will fcus n the Authrizatin and Access cntrl aspects.
2 Database Users Mst cmmercial DBMS include a security subsystem that manages access t schemas and their cntents There is a ntin f a user that pssesses sme authrity t access and manipulate schema bjects. A special user called the System Manager, System Administratr r Database Administratr (DBA) pssesses the authrity t perfrm any peratins n any bject. Oracle Sybase DBMS SYSTEM sa MS SQL-Server sa DB2 DBA user db2admin r db2inst (the instance wner) This is similar t the superuser in an perating system (rt in UNIX r administratr in Windws NT/2000) Respnsibilities f the DBA include: Creating accunts (adding users) Granting and revking privileges Assigning security clearance levels (in MAC) Befre a user can access database bjects, they must be authenticated in the DBMS. Typically, this invlves supplying a valid user name and passwrd t the DBMS. All accunt infrmatin is stred within the DBMS Anther ptin is using an perating system level lgin t authenticate a user t the DBMS. e.g., if yu have been authenticated by the OS n the server, then yu are OK t use the DBMS. A third ptin is t use a distributed authenticatin mechanism such as Kerbers r sme frm f Directry Services (e.g., Nvell r LDAP) t prvide a "single lgin" fr all netwrk, OS and DBMS services. Once a user has been authenticated t the DBMS, a lg-in sessin is established. The sessin remains in effect until it is terminated by the user r by sme kind f failure (DBMS, server, netwrk, client) All majr DBMS allw auditing f lg-in sessins (date/time, username, client inf (IP address, applicatin, etc.)) Creating Users/Accunts in cmmercial DBMS 1. MS SQL Server Can use the perating system (NT) t authenticate Add users with the sp_addlgin prcedure 'encryptin_ptin'
3 is the default database t be is the default language character set t is a unique system identifier (aut generated if nt given) is an ptin t encrypt the passwrd befre it is stred in the system tables. 2. SQL Server Prvides a nice graphical user interface (Enterprise Manager) t create users amng ther things: 3. Oracle In Oracle, the CREATE USER statement can be used t create new users: CREATE USER newuser IDENTIFIED BY newpasswrd DEFAULT TABLESPACE tablespace TEMPORARY TABLESPACE temptablespace QUOTA xm n tablespace; Where tablespace is an existing tablespace in the DBMS, temptablespace is an existing temprary tablespace in the DBMS, and x is sme number f megabytes f quta t allcate t the user.
4 After the user is created, CONNECT and CREATE SESSION privileges must be granted: GRANT CONNECT, CREATE SESSION TO newuser; T remve a user, the DROP USER statement can be emplyed. If the user has tables r ther bjects in their schema, the DROP USER username CASCADE statement can be emplyed. Oracle als prvides a graphical user interface t create users (part f the Oracle Enterprise Manager):
5 Discretinary Access Cntrl Typically security fr database authrizatin purpses is implemented in an authrizatin subsystem that mnitrs every transactin in the database. This is part f the DBMS. Authrizatin rules take int accunt a few main ideas: 1. Subjects: Individuals wh perfrm sme activity n the database. Might include specific peple (e.g., user tannd n cis.kemu.edu) r a grup f users (faculty n cisnet). 2. Objects: Database units that require authrizatin in rder t manipulate. Database units might include an entire table, specific clumns in a table, specific rws in a table, etc. 3. Actins: Any actin that might be perfrmed n an bject by a subject. Fr example: Read, Mdify, Insert, Write, Delete, Grant (the ability t grant authrizatins t thers) 4. Cnstraint: A mre specific rule regarding an aspect f the bject and actin. These elements are cmmnly cmbined int an authrizatin table Subject Object Actin Cnstraint Ed Emplyee Read Nne Ed Emplyee Insert Nne Ed Emplyee Mdify Nne Ed Emplyee Grant Nne Bill Emplyee Read Salary < 50,000 Sally PurchaseOrder Insert Ttal < 1,000 Sally PurchaseOrder Mdify Ttal < 1,000 PayrllClerks Emplyee Read Nne What happens as the number f subjects and bjects grws? Presently, n cmmercial DBMS supprts this level f authrizatin flexibility. A DBMS supprts sme basic authrizatin mdels. Applicatin develpers must prvide mre cmplex cnstraint enfrcement. Subject-Based Security Subjects are individually defined in the DBMS and each bject and actin is specified. Fr example, user SMITH (a Subject) has the fllwing authrizatins: Objects Actins EMPLOYEES ORDERS PRODUCTS... Read Y Y Y...
6 Insert N Y N... Mdify N Y Y... Delete N N N... Grant N N N... Object-Based Security Objects are individually defined in the DBMS and each subject and actin is specified. Fr example, the EMPLOYEES table (an Object) has the fllwing authrizatins: Subjects Actins SMITH JONES GREEN DBA... Read Y Y N Y... Insert N N N Y... Mdify N N N Y... Delete N N N Y... Grant N N N Y... Mandatry Access Cntrl Used in gvernment and ther high-security envirnments. Als called: Multilevel security (MLS) Objects are given a security class r level. Fr example: Tp-Secret Secret Public Subjects are given a security clearance: Tp-secret, Secret, Public Tw main rules are enfrced: 1. N subject can read an bject at a higher level. e.g., a subject with Secret clearance may nt read an bject at Tp-secret level. 2. N subject can write an bject at a lwer level (N write-dwn). e.g., a subject with tp-secret clearance may nt write a secret dcument. In a DBMS, an MLS can be implemented by classifying every clumn, table, etc. and then supplying clearances t each user. Fr example: Trusted Oracle Be aware f cvert channels. Fr example: Salaries f emplyees making mre than $50,000 are secret Salaries f thers are public A user with public clearance pses a query t the database. Any recrds that d nt appear indicate emplyees wh make mre than $50,000.
7 The SQL GRANT and REVOKE Statements SQL prvides tw main statements fr setting up authrizatin. GRANT is used t grant an actin n an bject t a subject. GRANT actin1, actin2... ON bject1, bject2,... TO subject1, subject2... Anther ptin f the GRANT statement is WITH GRANT OPTION. This allws the grantee t prpagate the authrizatin t anther subject. Fr example, assume we have a database with Tables: emplyees, departments, rders, prducts Users: smith, jnes, green, dba GRANT INSERT, DELETE, UPDATE, SELECT ON emplyees, departments TO smith ; GRANT INSERT, SELECT ON rders TO smith ; GRANT SELECT ON prducts TO smith ; GRANT SELECT ON emplyees, departments TO jnes ; GRANT INSERT, DELETE, UPDATE, SELECT ON emplyees, departments, rders, prducts TO dba WITH GRANT OPTION ; Grants can als be dne n specific clumns in a table: GRANT SELECT ON prducts TO jnes ; GRANT UPDATE ON prducts (price) TO jnes ; If n GRANT statement is issued, it is assumed that n authrizatin is given (e.g., user GREEN abve). REVOKE is used t revke authrizatins frm subjects. REVOKE actin1, actin2,... ON bject1, bject2,... FROM subject1, subject2,... If Ms. Smith leaves the cmpany, then we shuld: REVOKE INSERT, DELETE, UPDATE, SELECT ON emplyees, departments FROM smith ; REVOKE INSERT, SELECT ON rders FROM smith ; REVOKE SELECT ON prducts FROM smith ; Many RDBMS have an ALL PRIVILEGES ptin that will revke all f the privileges n an bject frm a subject:
8 REVOKE ALL PRIVILEGES ON emplyees, departments, rders, prducts FROM smith ; Nte: Oracle nly supprts granting a set f privileges/actins n ne bject t ne subject within a single statement. GRANT actin1, actin2... ON bject TO subject ; We can grup users int ROLES r GROUPS and grant r revke privileges frm the cllectin. In Oracle we can d smething like: CREATE ROLE purchasing_clerks; GRANT SELECT ON vendrs TO purchasing_clerks; GRANT SELECT, INSERT, UPDATE, DELETE ON purchase_rders TO purchasing_clerks; GRANT SELECT, INSERT, UPDATE, DELETE ON p_items TO purchasing_clerks; GRANT purchasing_clerks TO smith; GRANT purchasing_clerks TO jnes; GRANT purchasing_clerks TO green; Security under Shared MS Access databases Here is a cmprehensive guide t hw MS Access accmplishes this:
Please contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationManaging User Accounts
A variety f user types are available in Lighthuse Transactin Manager (LTM) with cnfigurable permissins that allw the Accunt Administratr and administratr-type users fr the accunt t manage the abilities
More informationSUB-USER ADMINISTRATION HELP GUIDE
P a g e 1 SUB-USER ADMINISTRATION HELP GUIDE Welcme t Prsperity Bank. Any previusly created Sub-User lgin frm the F&M system befre Friday, May 16 cnverted t the Prsperity system. Once lgged n t the Prsperity
More informationE-Lock Policy Manager White Paper
White Paper Table f Cntents 1 INTRODUCTION... 3 2 ABOUT THE POLICY MANAGER... 3 3 HOW E-LOCK POLICY MANAGER WORKS... 3 4 WHAT CAN I DO WITH THE POLICY MANAGER?... 4 4.1 THINGS YOU CONTROL IN SIGNING...
More informationSAS Viya 3.2 Administration: Mobile Devices
SAS Viya 3.2 Administratin: Mbile Devices Mbile Devices: Overview As an administratr, yu can manage a device s access t SAS Mbile BI, either by exclusin r inclusin. If yu manage by exclusin, all devices
More informationConfigure Data Source for Automatic Import from CMDB
AvailabilityGuard TM Cnfigure Data Surce fr Autmatic Imprt frm CMDB AvailabilityGuard allws yu t cnfigure business entities (such as services, divisins, and applicatins) and assign hsts, databases, and
More informationCCNA Security v2.0 Chapter 3 Exam Answers
CCNA Security v2.0 Chapter 3 Exam Answers 1. Because f implemented security cntrls, a user can nly access a server with FTP. Which AAA cmpnent accmplishes this? accunting accessibility auditing authrizatin
More informationAdmin Report Kit for Exchange Server
Admin Reprt Kit fr Exchange Server Reprting tl fr Micrsft Exchange Server Prduct Overview Admin Reprt Kit fr Exchange Server (ARKES) is an Exchange Server Management and Reprting slutin that addresses
More informationCaseWare Working Papers. Data Store user guide
CaseWare Wrking Papers Data Stre user guide Index 1. What is a Data Stre?... 3 1.1. When using a Data Stre, the fllwing features are available:... 3 1.1.1.1. Integratin with Windws Active Directry... 3
More informationMaximo Reporting: Maximo-Cognos Metadata
Maxim Reprting: Maxim-Cgns Metadata Overview...2 Maxim Metadata...2 Reprt Object Structures...2 Maxim Metadata Mdel...4 Metadata Publishing Prcess...5 General Architecture...5 Metadata Publishing Prcess
More informationUsers, groups, collections and submissions in DSpace. Contents
Users, grups, cllectins and submissins in DSpace Cntents Key cncepts... 2 User accunts and authenticatin... 2 Authrisatin and privileges... 2 Resurce plicies... 2 User rles and grups... 3 Submissin wrkflws...
More informationINSTALLING CCRQINVOICE
INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a
More informationImplementation of Authentication Mechanism for a Virtual File System
Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura Abstract
More informationBANNER BASICS. What is Banner? Banner Environment. My Banner. Pages. What is it? What form do you use? Steps to create a personal menu
BANNER BASICS What is Banner? Definitin Prduct Mdules Self-Service-Fish R Net Lg int Banner Banner Envirnment The Main Windw My Banner Pages What is it? What frm d yu use? Steps t create a persnal menu
More informationWave IP 4.5. CRMLink Desktop User Guide
Wave IP 4.5 CRMLink Desktp User Guide 2015 by Vertical Cmmunicatins, Inc. All rights reserved. Vertical Cmmunicatins and the Vertical Cmmunicatins lg and cmbinatins theref and Vertical ViewPint, Wave Cntact
More informationUsing the Swiftpage Connect List Manager
Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts
More informationStructure Query Language (SQL)
Structure Query Language (SQL) 1. Intrductin SQL 2. Data Definitin Language (DDL) 3. Data Manipulatin Language ( DML) 4. Data Cntrl Language (DCL) 1 Structured Query Language(SQL) 6.1 Intrductin Structured
More informationAccess the site directly by navigating to in your web browser.
GENERAL QUESTIONS Hw d I access the nline reprting system? Yu can access the nline system in ne f tw ways. G t the IHCDA website at https://www.in.gv/myihcda/rhtc.htm and scrll dwn the page t Cmpliance
More informationUsing the Swiftpage Connect List Manager
Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts
More informationSoftware Usage Policy Template
Sftware Usage Plicy Template This template is t accmpany the article: The Sftware Usage Plicy - An Indispensible Part f Yu SAM Tlbx The full article can be fund here: http://www.itassetmanagement.net/tag/plicy-template/
More informationImagine for MSDNAA Student SetUp Instructions
Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS
More informationQuick Reference Guide User Permissions & Roles - Buyers. Table of Contents
User Permissins & Rles - Buyers Table f Cntents User Permissins & Rles... 2 Adding New Users... 2 Editing Existing Users... 3 Users Search Table... 3 Creating User Rles... 4 Editing Existing Rles... 6
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authenticatin fr Cisc IPSec VPN Fr VMware AirWatch Have dcumentatin feedback? Submit a Dcumentatin Feedback supprt ticket using the Supprt Wizard n supprt.air-watch.cm. This
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician
More informationHPE AppPulse Mobile. Software Version: 2.1. IT Operations Management Integration Guide
HPE AppPulse Mbile Sftware Versin: 2.1 IT Operatins Management Integratin Guide Dcument Release Date: Nvember 2015 Cntents Overview: The IT Operatins Management Integratin 3 System Requirements 3 Hw t
More informationTroubleshooting of network problems is find and solve with the help of hardware and software is called troubleshooting tools.
Q.1 What is Trubleshting Tls? List their types? Trubleshting f netwrk prblems is find and slve with the help f hardware and sftware is called trubleshting tls. Trubleshting Tls - Hardware Tls They are
More informationReference Guide. Service Pack 3 Cumulative Update 2. Revision J Issued October DocAve 6: Control Panel
DcAve 6 Cntrl Panel Reference Guide Service Pack 3 Cumulative Update 2 Revisin J Issued Octber 2013 DcAve 6: Cntrl Panel 1 Table f Cntents Abut Cntrl Panel... 6 Submitting Dcumentatin Feedback t AvePint...
More informationStudent participation Students can register online, track progress, express interest and demonstrate proficiency.
Page 1 f 31 Intrductin Our MAG 10 Learning Management System (LMS) is a Web based technlgy used t plan, implement, and assess a specific learning prcess. LMS is a training prgram which prvides cmplete
More informationOracle Universal Records Management Oracle Universal Records Manager Adapter for Documentum Installation Guide
Oracle Universal Recrds Management Oracle Universal Recrds Manager Adapter fr Dcumentum Installatin Guide December 2009 Universal Recrds Manager Adapter fr Dcumentum Installatin Guide, Cpyright 2009, Oracle.
More informationOO Shell for Authoring (OOSHA) User Guide
Operatins Orchestratin Sftware Versin: 10.70 Windws and Linux Operating Systems OO Shell fr Authring (OOSHA) User Guide Dcument Release Date: Nvember 2016 Sftware Release Date: Nvember 2016 Legal Ntices
More informationProcurement Contract Portal. User Guide
Prcurement Cntract Prtal User Guide Cntents Intrductin...2 Access the Prtal...2 Hme Page...2 End User My Cntracts...2 Buttns, Icns, and the Actin Bar...3 Create a New Cntract Request...5 Requester Infrmatin...5
More informationo User ID (UID) The numerical equivalent of the username which is referenced by the system and applications when determining access privileges.
TROUBLESHOOTING On Red Hat Enterprise Linux, infrmatin abut user accunts and grups are stred in several text files within the /etc/ directry. When a system administratr creates new user accunts, these
More informationCustomer Information. Agilent 2100 Bioanalyzer System Startup Service G2949CA - Checklist
This checklist is used t prvide guidance and clarificatin n aspects f the auxillary Startup Service (G2949CA) including Security Pack Installatin and Familiarizatin f yur Agilent 2100 Bianalyzer System
More informationHRConnect Manager Self-Service Work Instruction
This Quick Reference Guide gives a brief verview f the prcesses used t cmplete Manager Self-Service actins within HRCnnect. This guide cvers hw yu can manage yur apprvals. 1. Apprve Pending Request via
More informationGPA: Plugin for OS Command With Solution Manager 7.1
GPA: Plugin fr OS Cmmand With Slutin Manager 7.1 The plugin OS Cmmand can be used in yur wn guided prcedures. It ffers the pssibility t execute pre-defined perating system cmmand n each hst part f the
More informationProduct Documentation. New Features Guide. Version 8.7.5/XE6
Prduct Dcumentatin New Features Guide Versin 8.7.5/XE6 2015 Embarcader Technlgies, Inc. Embarcader, the Embarcader Technlgies lgs, and all ther Embarcader Technlgies prduct r service names are trademarks
More informationABELDent Platform Setup Conventions
ABELDent Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELDent licensees and their hardware vendrs with the infrmatin that they will require
More informationMySqlWorkbench Tutorial: Creating Related Database Tables
MySqlWrkbench Tutrial: Creating Related Database Tables (Primary Keys, Freign Keys, Jining Data) Cntents 1. Overview 2 2. Befre Yu Start 2 3. Review Database Terms and Cncepts 2 4. Cnnect t MySql using
More informationTable of Contents. WipeDrive Enterprise Logging, March Logging Settings... 3 Log Format Types Audit Log Destination Options...
WipeDrive Enterprise Lgging, March 2018 Table f Cntents Lgging Settings... 3 Lg Frmat Types... 4 Plain Text Lg File Optin... 4 Extensible Markup Language (XML) Lg File Optin... 6 Cmma Delimited (CSV) Lg
More informationAvePoint Perimeter Pro 1.9
G09 AvePint Perimeter Pr 1.9 Secured Share User Guide Issued December 2017 Table f Cntents What s New in this Guide... 4 Overview... 5 Internal Users... 6 Site Cllectin Administratrs... 7 External Prtal
More informationHomework: Populate and Extract Data from Your Database
Hmewrk: Ppulate and Extract Data frm Yur Database 1. Overview In this hmewrk, yu will: 1. Check/revise yur data mdel and/r marketing material frm last week's hmewrk- this material will later becme the
More informationABELMed Platform Setup Conventions
ABELMed Platfrm Setup Cnventins 1 Intrductin 1.1 Purpse f this dcument The purpse f this dcument is t prvide prspective ABELMed licensees and their hardware vendrs with the infrmatin that they will require
More informationSTUDIO DESIGNER. Design Projects Basic Participant
Design Prjects Basic Participant Thank yu fr enrlling in Design Prjects 2 fr Studi Designer. Please feel free t ask questins as they arise. If we start running shrt n time, we may hld ff n sme f them and
More informationDocAve 6 Service Pack 2 Control Panel
DcAve 6 Service Pack 2 Cntrl Panel Reference Guide Revisin D Issued February 2013 DcAve 6: Cntrl Panel 1 Table f Cntents Abut Cntrl Panel... 6 Submitting Dcumentatin Feedback t AvePint... 6 Befre Yu Begin...
More informationData Requirements. File Types. Timeclock
A daunting challenge when implementing a cmmercial IT initiative can be understanding vendr requirements clearly, t assess the gap between yur data and the required frmat. With EasyMetrics, if yu are using
More informationSingle File Upload Guide
Single File Uplad Guide August 15, 2018 Versin 9.6.134.78 Single File Uplad Guide 1 Fr the mst recent versin f this dcument, visit ur dcumentatin website. Single File Uplad Guide 2 Table f Cntents 1 Single
More informationDocAve 6 Control Panel
DcAve 6 Cntrl Panel DcAve 6 Cntrl Panel Reference Guide Reference Guide Service Pack 4, Cumulative Update 3 Revisin T Service Pack 4, Cumulative Update 3 Issued Nvember 2014 Revisin S Issued September
More informationHigh Security SaaS Concept Software as a Service (SaaS) for Life Science
Sftware as a Service (SaaS) fr Life Science Cpyright Cunesft GmbH Cntents Intrductin... 3 Data Security and Islatin in the Clud... 3 Strage System Security and Islatin... 3 Database Security and Islatin...
More informationAccess 2000 Queries Tips & Techniques
Access 2000 Queries Tips & Techniques Query Basics The query is the basic tl that Access prvides fr retrieving infrmatin frm yur database. Each query functins like a questin that can be asked immediately
More informationiallworx User s Guide
Versin 1.0 September 12, 2010 Allwrx Crp. 300 Main Street East Rchester, NY 14445 www.allwrx.cm Supprt@allwrx.cm 1.866.Allwrx 585.421.3850 Fax: 585.421.3853 2011 Allwrx Crp, a whlly wned subsidiary f PAETEC
More informationMcGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55.
Schl f Cmputer Science McGill University Schl f Cmputer Science COMP-206 Sftware Systems Due: September 29, 2008 n WEB CT at 23:55 Operating Systems This assignment explres the Unix perating system and
More informationComplyWorks Subscription User Guide. October 6, 2011
CmplyWrks Subscriptin User Guide Octber 6, 2011 Cntents 1. Register... 3 2. Get cmpliant... 3 a) Pay fr yur accunt... 3 b) Cllect the dcuments yu ll need... 4 c) Enter yur infrmatin... 4 d) Publish yur
More informationLaboratory #13: Trigger
Schl f Infrmatin and Cmputer Technlgy Sirindhrn Internatinal Institute f Technlgy Thammasat University ITS351 Database Prgramming Labratry Labratry #13: Trigger Objective: - T learn build in trigger in
More informationPrivacy Policy. Information We Collect. Information You Choose to Give Us. Information We Get When You Use Our Services
Privacy Plicy Last Mdified: September 26, 2016 Pictry is a fast and fun way t share memes with yur friends and the wrld arund yu. Yu can send a Pictry game t friends and view the pictures they submit in
More informationFile Share Navigator Online
File Share Navigatr Online User Guide Service Pack 7 Issued September 2017 Table f Cntents What s New in this Guide... 4 Abut File Share Navigatr Online... 5 Cmpnents f File Share Navigatr Online... 5
More informationKaltura Video Extension for SharePoint 2013 Deployment Guide for Microsoft Office 365. Version: 1.0
Kaltura Vide Extensin fr SharePint 2013 Deplyment Guide fr Micrsft Office 365 Versin: 1.0 Kaltura Business Headquarters 250 Park Avenue Suth, 10th Flr, New Yrk, NY 10003 Tel.: +1 800 871 5224 Cpyright
More informationStealing passwords via browser refresh
Stealing passwrds via brwser refresh Authr: Karmendra Khli [karmendra.khli@paladin.net] Date: August 07, 2004 Versin: 1.1 The brwser s back and refresh features can be used t steal passwrds frm insecurely
More informationRBC USER MANUAL - BULK EFT/ACH DATA INPUT TEMPLATE (EASTERN CARIBBEAN MARKETS ONLY)
RBC USER MANUAL - BULK EFT/ACH DATA INPUT TEMPLATE (EASTERN CARIBBEAN MARKETS ONLY) Published May 2018 This dcument prvides a step by step by guide n use f the Bulk EFT/ACH Input Template (Micrsft Excel).
More informationAnnouncing Veco AuditMate from Eurolink Technology Ltd
Vec AuditMate Annuncing Vec AuditMate frm Eurlink Technlgy Ltd Recrd any data changes t any SQL Server database frm any applicatin Database audit trails (recrding changes t data) are ften a requirement
More informationExtended Vendors lets you: Maintain vendors across multiple Sage 300 companies using the Copy Vendors functionality. o
Extended Vendrs Extended Vendrs is an enhanced replacement fr the Sage Vendrs frm. It prvides yu with mre infrmatin while entering a PO and fast access t additinal PO, Vendr, and Item infrmatin. Extended
More informationSystems & Operating Systems
McGill University COMP-206 Sftware Systems Due: Octber 1, 2011 n WEB CT at 23:55 (tw late days, -5% each day) Systems & Operating Systems Graphical user interfaces have advanced enugh t permit sftware
More informationIMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7
IMPORTING INFOSPHERE DATA ARCHITECT MODELS INFORMATION SERVER V8.7 Prepared by: March Haber, march@il.ibm.cm Last Updated: January, 2012 IBM MetaData Wrkbench Enablement Series Table f Cntents: Table f
More informationOracle BPM 10rR3. Role Authorization resolution using groups. Version: 1.0
Oracle BPM 10rR3 Rle Authrizatin reslutin using grups Versin: 1.0 OBPM 10gR3 Rle Authrizatin reslutin using grups Cntents Intrductin... 3 Sme BPM & LDAP cncepts... 4 Cnfiguring OBPM t use different grup
More informationDocAve Governance Automation 2
DcAve Gvernance Autmatin 2 Business User Guide Service Pack 2 Issued March 2018 The Enterprise-Class Management Platfrm fr SharePint Gvernance Table f Cntents What s New in this Guide... 3 Submitting Dcumentatin
More informationBMC Remedyforce Integration with Bomgar Remote Support
BMC Remedyfrce Integratin with Bmgar Remte Supprt 2017 Bmgar Crpratin. All rights reserved wrldwide. BOMGAR and the BOMGAR lg are trademarks f Bmgar Crpratin; ther trademarks shwn are the prperty f their
More informationCreating a TES Encounter/Transaction Entry Batch
Creating a TES Encunter/Transactin Entry Batch Overview Intrductin This mdule fcuses n hw t create batches fr transactin entry in TES. Charges (transactins) are entered int the system in grups called batches.
More informationBMC Remedyforce Integration with Remote Support
BMC Remedyfrce Integratin with Remte Supprt 2003-2018 BeyndTrust, Inc. All Rights Reserved. BEYONDTRUST, its lg, and JUMP are trademarks f BeyndTrust, Inc. Other trademarks are the prperty f their respective
More informationSummary. Server environment: Subversion 1.4.6
Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin
More informationPopulate and Extract Data from Your Database
Ppulate and Extract Data frm Yur Database 1. Overview In this lab, yu will: 1. Check/revise yur data mdel and/r marketing material (hme page cntent) frm last week's lab. Yu will wrk with tw classmates
More informationEnrolling onto the Open Banking Directory How To Guide
Enrlling nt the Open Banking Directry Hw T Guide Date: Octber 2017 Versin: v3.0 Classificatin: PUBLIC OPEN BANKING LIMITED ENROLLING ONTO THE OPEN BANKING DIRECTORY Page 1 f 14 Cntents 1. Intrductin 3
More informationMission Antyodaya Android Mobile & Web Application. Frequently Asked Questions
Missin Antydaya Andrid Mbile & Web Applicatin Frequently Asked Questins Natinal Infrmatics Centre v1.0 Missin Antydaya Mbile & Web Applicatin 1 Intrductin What is the name f Mbile applicatin? Earlier it
More informationCCNA Security v2.0 Chapter 2 Exam Answers
CCNA Security v2.0 Chapter 2 Exam Answers 1. An administratr defined a lcal user accunt with a secret passwrd n ruter R1 fr use with SSH. Which three additinal steps are required t cnfigure R1 t accept
More informationTN How to configure servers to use Optimise2 (ERO) when using Oracle
TN 1498843- Hw t cnfigure servers t use Optimise2 (ERO) when using Oracle Overview Enhanced Reprting Optimisatin (als knwn as ERO and Optimise2 ) is a feature f Cntrller which is t speed up certain types
More informationKeeping Dynamics GP Secure
Keeping Dynamics GP Secure February 23, 2017 Charles Allen Senir Managing Cnsultant BKD Technlgies callen@bkd.cm T Receive CPE Credit Participate in entire webinar Answer attendance checks & plls when
More informationClass Roster. Curriculum Class Roster Step-By-Step Procedure
Imprtant Infrmatin The page prvides faculty and staff a list f students wh are enrlled and waitlisted in a particular class. Instructrs are given access t each class fr which they are listed as an instructr,
More informationAsset Panda Web Application Release 12.02
Asset Panda Web Applicatin Release 12.02 User Cnfiguratin Permissins Several changes have been made t this page including the fllwing. Page Design The layut has been changed s that all Edit and Misc Cnfiguratins
More informationE. G. S. Pillay Engineering College, Nagapattinam Computer Science and Engineering
IT2042 - Infrmatin Security 1-1 E. G. S. Pillay Engineering Cllege, Nagapattinam Cmputer Science and Engineering Elective II IT 2042 INFORMATION SECURITY VIII Sem CSE QUESTION BANK - UNIT-IV 1) What is
More informationADSS Server Evaluation Quick Guide
ADSS Server Evaluatin Quick Guide This dcument aims t prvide a quick d this and it wrks guide t evaluating ADSS Enterprise Server as a PDF Signing Server bth fr server-side signing and als fr client-side
More informationStock Affiliate API workflow
Adbe Stck Stck Affiliate API wrkflw The purpse f this dcument is t illustrate the verall prcess and technical wrkflw fr Adbe Stck partners wh want t integrate the Adbe Stck Search API int their applicatins.
More informationOATS Registration and User Entitlement Guide
OATS Registratin and User Entitlement Guide The OATS Registratin and Entitlement Guide prvides the fllwing infrmatin: OATS Registratin The prcess and dcumentatin required fr a firm r Service Prvider t
More informationFrequently Asked Questions
Frequently Asked Questins What are the benefits f activech? activech allws yur rganizatin t prvide an n-premise, managed and secure alternative t Drpbx and ther file synching and sharing slutins. Benefits
More informationManaging Your Access To The Open Banking Directory How To Guide
Managing Yur Access T The Open Banking Directry Hw T Guide Date: June 2018 Versin: v2.0 Classificatin: PUBLIC OPEN BANKING LIMITED 2018 Page 1 f 32 Cntents 1. Intrductin 3 2. Signing Up 4 3. Lgging In
More informationSTUDENTS/STAFF MANAGEMENT -SUMMATIVE
SUMMATIVE AND STATE-LEVEL TESTING STUDENTS/STAFF MANAGEMENT -SUMMATIVE This Students/Staff Management Guide is written fr leaders at schls r the district wh: Prepare and uplad a rster f students and staff
More informationSecure File Transfer Protocol (SFTP) Interface for Data Intake User Guide
Secure File Transfer Prtcl (SFTP) Interface fr Data Intake User Guide Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 SFTP Access t FINRA... 2 SFTP
More informationPrivacy Policy concerning the use of the website and the use of cookies
Privacy Plicy cncerning the use f the website and the use f ckies Agria understands the imprtance f the privacy f its custmers and the prtectin f their persnal data. Present plicy utlines the handling
More informationCampuses that access the SFS nvision Windows-based client need to allow outbound traffic to:
Summary This dcument is a guide intended t guide yu thrugh the prcess f installing and cnfiguring PepleTls 8.55.27 (r current versin) via Windws Remte Applicatin (App). Remte App allws the end user t run
More information1on1 Sales Manager Tool. User Guide
1n1 Sales Manager Tl User Guide Table f Cntents Install r Upgrade 1n1 Page 2 Setting up Security fr Dynamic Reprting Page 3 Installing ERA-IGNITE Page 4 Cnverting (Imprting) Queries int Dynamic Reprting
More informationHow to set up Dell SonicWALL Aventail SRA Appliance with OPSWAT GEARS Client
Hw t set up Dell SnicWALL Aventail SRA Appliance with OPSWAT GEARS Client Abut This Guide:... 2 End Pint Cntrl... 3 Device Prfile Definitin... 3 1 Abut This Guide: GEARS is a platfrm fr netwrk security
More informationOnline Banking for Business USER GUIDE
Online Banking fr Business estatements USER GUIDE Cntents Cntents... 1 Online Banking fr Business Getting Started... 2 Technical Requirements... 2 Supprted brwsers... 2 Minimum system requirements... 2
More informationPassword Reset for Remote Users
1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin
More informationIntegrating QuickBooks with TimePro
Integrating QuickBks with TimePr With TimePr s QuickBks Integratin Mdule, yu can imprt and exprt data between TimePr and QuickBks. Imprting Data frm QuickBks The TimePr QuickBks Imprt Facility allws data
More informationLog shipping is a HA option. Log shipping ensures that log backups from Primary are
LOG SHIPPING Lg shipping is a HA ptin. Lg shipping ensures that lg backups frm Primary are cntinuusly applied n standby. Lg shipping fllws a warm standby methd because manual prcess is invlved t ensure
More informationMySqlWorkbench Tutorial: Creating Related Database Tables
MySqlWrkbench Tutrial: Creating Related Database Tables (Primary Keys, Freign Keys, Jining Data) Cntents 1. Overview 2 2. Befre Yu Start 2 3. Cnnect t MySql using MySqlWrkbench 2 4. Create Tables web_user
More informationWorldShip PRE-INSTALLATION INSTRUCTIONS: INSTALLATION INSTRUCTIONS: Window (if available) Install on a Single or Workgroup Workstation
PRE-INSTALLATION INSTRUCTIONS: This dcument discusses using the WrldShip DVD t install WrldShip. Yu can als install WrldShip frm the Web. G t the fllwing Web page and click the apprpriate dwnlad link:
More informationHP Universal CMDB. Software Version: Backup and Recovery Guide
HP Universal CMDB Sftware Versin: 10.21 Backup and Recvery Guide Dcument Release Date: July 2015 Sftware Release Date: July 2015 Backup and Recvery Guide Legal Ntices Warranty The nly warranties fr HP
More informationApp Orchestration 2.6
App Orchestratin 2.6 Terminlgy in App Orchestratin 2.6 Last Updated: July 8, 2015 Page 1 Terminlgy Cntents Elements f App Orchestratin... 3 Dmains... 3 Multi-Datacenter Deplyments... 4 Delivery Sites...
More informationOracle CPQ Cloud Release 1. New Feature Summary
Oracle CPQ Clud 2017 Release 1 New Feature Summary April 2017 1 TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE CPQ CLOUD... 4 MODERN SELLING EXPERIENCE... 4 Deal Negtiatin... 4 REST API Services... 4 ENTERPRISE
More informationUnderstanding Active Directory Domain Services (AD DS) Functional Levels
Understanding Active Directry Dmain Services (AD DS) Functinal Levels 92 ut f 99 rated this helpful - Rate this tpic Updated: May 28, 2014 Applies T:,,, Functinal levels determine the available Active
More informationUPGRADING TO DISCOVERY 2005
Centennial Discvery 2005 Why Shuld I Upgrade? Discvery 2005 is the culminatin f ver 18 mnths wrth f research and develpment and represents a substantial leap frward in audit and decisin-supprt technlgy.
More informationAdverse Action Letters
Adverse Actin Letters Setup and Usage Instructins The FRS Adverse Actin Letter mdule was designed t prvide yu with a very elabrate and sphisticated slutin t help autmate and handle all f yur Adverse Actin
More information