Subject Re: [IB-Architect] Fw: Mischievous SYSDBA
Author Tim Uckun
>Problem: gbak will need the key (or whatever) to access the restriction
>portion of the database. Unless we can come up with something tricky,
>this means giving the key to the system administrator, who is the one
>we're trying to protect the data from.

I don't think gback would necessarily be needed in an embedded application.
Couldn't you just copy gdb the file?

>Does this mean that the protection mechanism must work through
>sanctioned program using these interfaces? Defining something
>that is accessible through ODBC is quite a different beast than
>something limited to the native API.

Sooner or later everything has to go through the native API doesn't it? I
am afraid I am very ignorant in this regard. I just assumed that the ODBC
drivers would use the native API.

Tim Uckun
Due Diligence Inc. Americas Background
Investigation Expert.
If your company isn't doing background checks, maybe you haven't considered
the risks of a bad hire.