Method and system for managing security material and sevices in a distributed database system
First Claim
1. A method for managing security material in a database system comprising at least one first database, at least one second database, and at least one third database, which method comprises steps, wherein:
- said first database stores security material to be used in the database system, said security material is distributed from said first database to said third database, and said third database uses said security material to do one of the following;
to authenticate at least one application program and to authorize said at least one application program to access said second database in the database system.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and system is introduced for managing security material and security services, and for securely distributing them in a distributed database system where one or multiple distributed applications operate on distributed data. One database hosted by database server 21 contains master version of the security data of databases hosted by database servers 22 and 23. The database hosted by database server 21 has a global view of the security material for managing security of databases 28, 29. A special database type, a Security Manager (SM), is responsible of providing security services to application database of a database server. This helps to control application programs to access data of a database in a database server. This also facilitates the security management issues of complex database topologies, such as multi-tier hierarchies or multi-master topologies.
125 Citations
67 Claims
-
1. A method for managing security material in a database system comprising at least one first database, at least one second database, and at least one third database, which method comprises steps, wherein:
-
said first database stores security material to be used in the database system, said security material is distributed from said first database to said third database, and said third database uses said security material to do one of the following;
to authenticate at least one application program and to authorize said at least one application program to access said second database in the database system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for managing security material in a database system comprising at least one first database, at least one second database, and at least one third database, wherein;
-
said first database is arranged to store security material to be used in the database system, said security material is arranged to be distributed from said first database to said third database, and said third database is arranged to use said security material to do one of the following;
to authenticate and authorize applications that are attempting to access said second database in the database system. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A first database server for managing security material in a database system, the first database server comprising at least one first database, where said first database is in data connection with at least one second database server comprising at least one second database in a database system, wherein;
-
said first database is arranged to store security material to be used in the database system, said security material is arranged to be synchronized between said first database server and said second database server, and said second database server is arranged to use said security material to do one of the following;
to authenticate at least one application program and to authorize the said at least one application program to access said second database in the database system. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A second database server for managing security material in a database system, the second database server comprising at least one second database and at least one third database, where at least one third database is in data connection with at least one first database server comprising at least one first database, wherein;
-
said second database is arranged to use security material created by said first database, said security material relating to said second database is arranged to be synchronized between said first database and said third database, and said third database is arranged to do one of the following;
to authenticate at least one application program and to authorize said at least one application program to access said second database in the database system, on the basis of the said security material. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
Specification