Lack of Predictability in SET TRUSTED ROLE ------------------------------------------
Key: CORE-5787 URL: http://tracker.firebirdsql.org/browse/CORE-5787 Project: Firebird Core Issue Type: Improvement Components: Security Affects Versions: 3.0.3 Environment: All Reporter: Tony Whyman Priority: Minor The "SET TRUSTED ROLE" SQL statement was added in Firebird 3 and is described in the release notes as: "The idea of a separate SET TRUSTED ROLE command is that, when the trusted user attaches to a database with-out providing any role info, SET TRUSTED ROLE makes a trusted role (if one exists) the CURRENT_ROLE without any additional activity, such as setting it in the DPB. A trusted role is not a specific type of role but may be any role that was created using CREATE ROLE, or a predefined system role such as RDB$ADMIN. It becomes a trusted role for an attachment when the security objects mapping subsystem finds a match between the authentication result passed from the plug-in and a local or global mapping for the current database. The role may be one that is not even granted explicitly to that trusted user." This lack of predictability (e.g. the last statement in the above quote) may be of concern to Security Administrators which want to ensure that all access rights are explicit and deterministic. In order to mitigate such concerns it is proposed that a configuration option is provided to disable this feature either globally or on per database basis. -- This message is automatically generated by JIRA. - If you think it was sent incorrectly contact one of the administrators: http://tracker.firebirdsql.org/secure/Administrators.jspa - For more information on JIRA, see: http://www.atlassian.com/software/jira ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot Firebird-Devel mailing list, web interface at https://lists.sourceforge.net/lists/listinfo/firebird-devel