Next
     Introduction to Veil2

Table of Contents

Introduction to Veil2
I. Understanding Veil2 And Relational Security
1. What Is A Relational Security System?
2. How Is Relational Security Different?
3. Why Use Veil2
4. Veil2 Concepts
5. What is Veil2 And What Does It Provide?
6. How Difficult Is This?
II. Creating Your Veil2-based VPD Step By Step
7. Setting Up A Veil2 Virtual Private Database - Overview
8. Getting Started With Veil2 (STEP 1)
9. Identify and Define Your Scope Types (STEP 2)
10. Setting Up Authentication and Session Management (STEP 3)
11. Link Your Users To Veil2's Accessors (STEP 4)
12. Link Your Scopes and Security Contexts (STEP 5)
13. Define Your Scope Hierarchy (STEP 6)
14. Create Initial Privileges (STEP 7)
15. Integrate And/Or Create Roles (STEP 8)
16. Secure Your Tables (STEP 9)
17. Secure Your Views (STEP 10)
18. Assign Initial Roles (STEP 11)
19. Setup Housekeeping Tasks STEP 12
III. Implementation Details
20. Exploring The Veil2 Demos
21. The Veil2 Implementation: What You Need To Know
22. For Developers
23. How Veil2 Relates to the Original Veil
24. Tips and Guidelines
25. Performance
26. Security
27. Contact Links
A. Veil2 ERD and Database Objects
A.1. Veil2 Tables
B. Veil2 Views, Materialized Views and Caches
B.1. Veil2 Views
C. Veil2 Functions and Triggers
D. Veil2 C Implementation
E. Veil2 Authentication Protocols
E.1. Shared Session Authentication
E.2. Dedicated Database Sessions
E.3. Resetting Cached Privileges
E.4. Custom Database Sessions
F. Veil2 Changes History

     Next
     Introduction to Veil2