---------------------------<snip>---------------------
In my opinion, a properly impelemented security structure would have no user-id's named in security rules, instead all rules would have group (or role) names in them, so a connect/disconnect of a user to a group is all that is needed to grant access. If done that way, the only time the ID is referenced is in the connect command. I do agree that from the standpoint of management, allowing users to select ID's is problematic, and could cause collision issues. However, I also feel that embedding the departmental function in a userid is a bad idea, because then the ID has to change if the user gets transferred from one department to another.
-----------------------<unsnip>------------------------
To a point, I'll agree with that. But management doesn't always see it that way, especially in a small shop. Some functions are relegated to a single person, with no regard to transfers, vacations, terminations or new hires. Agreed, it's a short-sighted view, but it's a lot closer to reality than we'd like to admit. And if management doesn't get involved, seriously, then the proliferation of GROUPs can be as bad, or worse, than dealing with individual ID's. All too often, management looks upon security as an unpleasant side issue, with unfortunate results.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to