Circumventing password protection

Circumventing the password-protection mechanism may be necessary in the case of automated login systems. You can create a role that could access other roles without passwords.

If a System Security Officer wants to bypass the password mechanism for certain users, the System Security Officer can grant the password-protected role to another role and grant this new role to one or more users. Activation of this role automatically activates the password-protected role without having to provide a password.

For example:

Jane is the System Security Officer for the fictitious company ABC Inc., which uses automated login systems. Jane creates the following roles:

Jane grants the roles of financial_assistant and accounts_officer to the chief_financial_officer role:

grant role financial_assistant, accounts_officer to chief_financial_officer

Jane then grants the chief_financial_officer role to Bob:

grant role chief_financial_officer to bob

Bob logs in to Adaptive Server and activates the chief_financial_officer role:

set role chief_financial_officer on

The roles of financial_assistant and accounts_officer are automatically activated without Bob providing a password. Bob now has the ability to access everything under the financial_assistant and accounts_officer roles without having to enter the passwords for those roles.