Table of Contents
Previous Section Next Section

Chapter 15: Case Study: Implementing Role-Based Security

Overview

This chapter walks you through a case study examining how to use SQL and stored procedures to implement role-based security. You can implement the case study on any back-end relational database that supports stored procedures, such as SQL Server, DB2, or Oracle, and for any kind of application, be it e-commerce, intranet, or anything else.

Note 

The code download for this chapter includes separate scripts that will allow you to create the required tables and stored procedures on SQL Server, DB2, and Oracle.

The goal of this case study is to show you a flexible, extensible solution and explain how we came to the conclusions used to build the solution. By the end of the chapter, you should have a firm grasp on key concepts such as roles, permissions, and users, and you should know what kinds of features must be made available to an application to support role-based security.


Table of Contents
Previous Section Next Section