![]() |
Cloudscape and Security
|
Reference Manual |
Notes on the Cloudscape Security FeaturesBecause Cloudscape does not support traditional grant and revoke features, the security model has some basic limitations. For both embedded and client/server systems, it assumes that users are trusted. You must trust your full-access users not to perform undesirable actions. In addition, in the Cloudscape system, it is not necessary to have a specific connection (or permission to access a particular database) to shut down the system. Any authenticated user can shut down the system. However, a sophisticated user with the database encryption key might be able to physically change those properties in the database files. Other security holes to think about are:
For notes on the security limitations in a distributed, synchronized Cloudscape system, see the Cloudscape Synchronization Guide. |
|
![]() Cloudscape Version 3.6 For information about Cloudscape technical support, go to: www.cloudscape.com/support/.Copyright © 1998, 1999, 2000 Informix Software, Inc. All rights reserved. |