This chapter walks you through a case study examining how to use SQL and stored procedures to implement role-based security. You can implement the case study on any back-end relational database that supports stored procedures, such as SQL Server, DB2, or Oracle, and for any kind of application, be it e-commerce, intranet, or anything else.
Note |
The code download for this chapter includes separate scripts that will allow you to create the required tables and stored procedures on SQL Server, DB2, and Oracle. |
The goal of this case study is to show you a flexible, extensible solution and explain how we came to the conclusions used to build the solution. By the end of the chapter, you should have a firm grasp on key concepts such as roles, permissions, and users, and you should know what kinds of features must be made available to an application to support role-based security.