Contents
Next | ||
Introduction to Veil2 |
Table of Contents
- Introduction to Veil2
- I. Understanding Veil2 And Relational Security
- II. Creating Your Veil2-based VPD Step By Step
- 7. Setting Up A
Veil2
Virtual Private Database - Overview - 8. Getting Started With
Veil2
(STEP 1) - 9. Identify and Define Your Scope Types (STEP 2)
- 10. Setting Up Authentication and Session Management (STEP 3)
- 11. Link Your Users To
Veil2
's Accessors (STEP 4) - 12. Link Your Scopes and Security Contexts (STEP 5)
- 13. Define Your Scope Hierarchy (STEP 6)
- 14. Create Initial Privileges (STEP 7)
- 15. Integrate And/Or Create Roles (STEP 8)
- 16. Secure Your Tables (STEP 9)
- 17. Secure Your Views (STEP 10)
- 18. Assign Initial Roles (STEP 11)
- 19. Setup Housekeeping Tasks STEP 12
- 7. Setting Up A
- III. Implementation Details
- A.
Veil2
ERD and Database Objects - B.
Veil2
Views, Materialized Views and Caches - C. Veil2 Functions and Triggers
- D.
Veil2
C Implementation - E.
Veil2
Authentication Protocols - F.
Veil2
Changes History
Next | ||
Introduction to Veil2 |