|
Mladen,
Thanks for bringing it up. In my book I will cover
the VPD (vitual private database) in detail and will explain how to use the
application user model into making a secure authentication and authorization
model. Label security is nothing but a specialized tool based on the more
general VPD. Most security conscious organizations will probably like VPD
more as it provides more flexibility in defining who sees what? OLS is narrower
in focus, a carry over from the old CIA project where each record in a table was
treated like a file with a security level and persons were assigned cklearance
levels. The check was whether user's clearance is greater than or equal to the
record's (or the docuemnts) clearance. The authorization requirements were
simple.
Most real life system will most likely have
different and more complex requirements, though. Instead of plain simple levels,
your records will have to be verified against a lot of parameters. For instance,
in your database (Oxford Health), you may have a senior business analyst (John
Napoli) with authorization to see claims that are (i) from a list of providers
he is approved to see, (ii) below $10000, (iii) for procedure codes that are not
protected by HIPAA's protected health information and perhaps a lot more. This
is not as simple as assigning a level to a row, but a rather complicated set of
where conditions applied at the runtime. VPD addresses that issue. Along with
application context, you will have the toolbox to build a complete
iron-clad authentication and authorization system.
Hope this helps.
Arup Nanda
|
Title: Passwords and authentication
- Passwords and authentication Jamadagni, Rajendra
- Re: Passwords and authentication Reginald . W . Bailey
- Re: Passwords and authentication Arup Nanda
- RE: Passwords and authentication Gogala, Mladen
- RE: Passwords and authentication Jamadagni, Rajendra
- Re: Passwords and authentication Arup Nanda
- Re: Passwords and authentication Arup Nanda
- Re: Re: Passwords and authentication rgaffuri
- RE: Passwords and authentication Gogala, Mladen
- RE: Re: Passwords and authentication Stephen Lee
- Re: Re: Passwords and authentication Arup Nanda
- RE: Re: Passwords and authentication Scott . Shafer
- Re: Re: Passwords and authentication Arup Nanda
- Re: Passwords and authentication bulbultyagi
- Re: Passwords and authentication Arup Nanda
