PGXN
PostgreSQL Extension Network
marcmunro
veil2 0.9.1
pt01
Users
Tags
Recent
Contents
Part I. Understanding Veil2 And Relational Security
Prev
Next
Introduction to Veil2
Home
Chapter 1. What Is A Relational Security System?
Part I. Understanding Veil2 And Relational Security
Table of Contents
1. What Is A Relational Security System?
1.1. What This Means - Some Examples
2. How Is Relational Security Different?
2.1. The
Traditional
Approach
2.2. The Relational Security Approach
2.3. Where Are Access Controls Implemented In A Relational Security System?
2.4. How Is Access Restricted In A Relational Security System?
2.5. Ease of Reasoning
2.6. Comprehensiveness
3. Why Use
Veil2
4.
Veil2
Concepts
4.1. Privileges
4.2. Scopes
4.3. Roles
4.4. Role Assignments
4.5. Security Contexts
4.6. Scope (and Context) Promotion
4.7. Authentication Contexts
4.8. Session Contexts
5. What is
Veil2
And What Does It Provide?
5.1. How It Works - An Overview
5.2. Refactoring Your Systems To Use
Veil2
6. How Difficult Is This?
6.1. Frequently Imagined Criticisms (FIC)
Prev
Next
Introduction to Veil2
Home
Chapter 1. What Is A Relational Security System?