Implementing Database Security and Auditing: Using Granular Access Control

Cover Image

In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system. You’ll see why this is so important, what methods exist to communicate the application user information to the database security system, and how to use this information to implement granular access control. You’ll also read some of the broader issues pertaining to the user directories and identity management.

Vendor:
Guardium, an IBM Company
Posted:
Feb 8, 2021
Published:
Sep 27, 2010
Format:
PDF
Type:
White Paper
Already a Bitpipe member? Log in here

Download this White Paper!