This uses special roles assigned to the users listed in Table 2-1.
Name |
Privilege |
Operating system login name |
---|---|---|
Rajnish Smith |
sso_role |
rsmith |
Catherine Macar-Swan |
sa_role |
cmacar |
Soshi Ikedo |
sa_role |
sikedo |
Julio Rozanski |
oper_role |
jrozan |
Alan Johnson |
dbo |
ajohnson |
Table 2-2 shows the sequence of commands you might use to set up a secure operating environment for Adaptive Server, based on the role assignments shown in Table 2-1. After logging in to the operating system, issue these commands using the initial “sa” account.
Commands |
Result |
---|---|
|
Logs in to Adaptive Server as “sa.” Both sa_role and sso_role are active. |
|
Sets auditing options for server-wide, security-relevant events, and the auditing of all actions that have sa_role or sso_role active. |
|
Enables auditing. |
|
|
|
Adds logins and passwords. |
|
Grant roles. |
|
Grants access to the auditing database, sybsecurity, by making Rajnish, who is the system security officer, the database owner. Alan is not granted any system-defined roles. |
sp_locklogin sa,"lock" |
Locks the “sa” login so that no one can log in as “sa.” Individuals can assume only the roles that are configured for them. |
|