Circumventing password protection

Circumventing the password-protection mechanism may be necessary in automated login systems. You can create a role that can access other roles without passwords.

A system security officer can bypass the password mechanism for certain users by granting the password-protected role to another role, and grant the password-protected role to one or more users. Activation of this role automatically activates the password-protected role without having to provide a password.

For example:

Jane is the system security officer for ABC Inc., which uses automated login systems. Jane creates the following roles:

Jane grants the roles of financial_assistant and accounts_officer to the chief_financial_officer role:

grant role financial_assistant, accounts_officer to chief_financial_officer

Jane then grants the chief_financial_officer role to Bob:

grant role chief_financial_officer to bob

Bob logs in to Adaptive Server and activates the chief_financial_officer role:

set role chief_financial_officer on

The roles of financial_assistant and accounts_officer are automatically activated without Bob providing a password. Bob can now access everything under the financial_assistant and accounts_officer roles without having to enter the passwords for those roles.