• Database Service level access controls
    Scalable Authentication: Database clusters consist of a large number of nodes, and the authentication models should be scalable to support such large network authentication
    Impersonation: Database services should be able to impersonate the user submitting the job so that the correct user isolation can be maintained
    Self-Served: Database jobs run for long time, so they should be able to ensure that the jobs are able to self-heal the delegated user authentication to complete the job
    Secure Inter Process Communication: Database services should be able to authenticate each other and ensure secured communication between themselves
  • User level access controls
    Users of Database should only be able to access data that is authorized for them
    Only authenticated users should be able to submit jobs to the Database cluster
    Users should be able to view, edit and kill only their own jobs

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>