Subject | Re: User name SYSDBA |
---|---|
Author | johnson_dave2003 |
Post date | 2005-08-10T07:51:43Z |
--- In Firebird-Architect@yahoogroups.com, "Claudio Valderrama C."
<cvalde@u...> wrote:
(fairly small) size. At one time my company did everythign with views
... then they spend three years untangling the dogs breakfast views
created. Now, views are forbidden unless there is no other way to do
what you need.
<cvalde@u...> wrote:
> > -----Original Message-----johnson_dave2003
> > From: Firebird-Architect@yahoogroups.com
> > [mailto:Firebird-Architect@yahoogroups.com]On Behalf Of
> > Sent: Martes, 09 de Agosto de 2005 8:24to the
> >
> > The traditional work around has been to open up the database with a
> > generic user ID for the connection pool (Jim would say no security),
> > and handle the authorization in the application.
>
> The traditional solution has been to create SQL views.
> :-)
>
> If all requests are going to be invalidated when a role is switched
> dynamically, I really do not see the big difference with reattaching
> db. I wish there was a way to calculate those permissions quickly.will be
> Otherwise, we are defeating the advantage of cached requests: they
> only be valid for the current connection and while roles don't change.SQL views are a maintenance nightmare once you get beyond a certain
>
> C.
(fairly small) size. At one time my company did everythign with views
... then they spend three years untangling the dogs breakfast views
created. Now, views are forbidden unless there is no other way to do
what you need.