Dag H. Wanvik wrote:
Thanks for starting this discussion, Rick, I am also interested in
looking at this.

Rick Hillegas <[EMAIL PROTECTED]> writes:
Thanks, Dag!
...

Missing privileges that are above the level of a single database:

- Create Database
- Shutdown System

Do we need a privilge for bootAll? BTW, I am not sure how bootAll
property is supposed to work, I could not find it documented.
Agreed. I've added this to the list in DERBY-2109.

Missing privileges specific to a particular database:

- Connect to that Database
- Shutdown that Database
- Create (in that Database) Java Plugins (currently
Functions/Procedures, but someday Aggregates and VTIs)

Maybe a separate privilege to upgrade a database would be desirable,
at least hard upgrade. And a privilege to encrypt/re-encrypt a
database?
Agreed. I've added this to the list in DERBY-2109 also.

I assume the new database level system privileges will that require
SQL authorization mode is active, not just the connection
authorization, or...? In a way they are orthogonal, since system
privileges are not defined by SQL. If bundled the name
(derby.database.sqlAuthorization) would be slightly misleading..
My mind is trending that way too: GRANT/REVOKE would be a natural way to control the per-database privileges even though it would be an extension to the ANSI spec. Other databases use GRANT/REVOKE to control these sorts of non-ANSI privileges. I could talk myself into extending the meaning of derby.database.sqlAuthorization to embrace these non-ANSI privileges: the mechanism (GRANT/REVOKE) is ANSI even though the specific privileges aren't.

The new system level system privileges (e.g. shutdown), would they
also be enabled by SQL authorization mode?

Dag

I will try to collect my thoughts on this topic and circulate them later today.

Thanks!
-Rick


Reply via email to