Professional Documents
Culture Documents
Database Security
:System Security .1
ﻳﻐﻄﻲ اﻟﻮﺻﻮل واﻻﺳﺘﺨﺪام ﻟﻘﺎﻋﺪة اﻟﺒﻴﺎﻧﺎت ،ﻣﺜﻞ اﺳﻢ اﻟﻤﺴﺘﺨﺪم واﻟﺮﻗﻢ
اﻟﺴﺮي .
: Data Security .2
هﻰ اﻟﺘﻰ ﻳﺘﻢ ﻓﻴﻬﺎ ﺗﺤﺪﻳﺪ اﻟﺼﻼﺣﻴﺎت ﻻﺳﺘﺨﺪام اﻟﺒﻴﺎﻧﺎت ﺑﻘﺎﻋﺪة اﻟﺒﻴﺎﻧﺎت.
) (DBAهﻮ اﻟﻮﺣﻴﺪ اﻟﺬى ﻟﺔ اﻟﺤﻖ ﻓﻰ اﻧﺸﺎء ﻣﺴﺘﺨﺪم ﺟﺪﻳﺪ،وﺑﻌﺪ اﻧﺸﺎءة ﻟﻠﻤﺴﺘﺨﺪم
اﻟﺠﺪﻳﺪ ﻳﻘﻮم ﺑﺎﻋﻄﺎءة اﻟﺼﻼﺣﻴﺎت اﻟﻤﻨﺎﺳﺒﺔ ﻟﺔ ﺣﺴﺐ ﻃﺒﻴﻌﺔ ﻋﻤﻠﺔ.وﺑﻬﺬة اﻟﺼﻼﺣﻴﺎت
ﻳﺘﻤﻜﻦ اﻟﻤﺴﺘﺨﺪم ﻣﻦ اﻟﺘﻌﺎﻣﻞ ﻣﻊ ﻗﺎﻋﺪة اﻟﺒﻴﺎﻧﺎت.
ﻳﺘﻢ اﻟﺒﺪء ﺑﻔﻘﺮة grant Privilegeﺛﻢ ﻧﻮع اﻟﺼﻼﺣﻴﺔ) ( Privilegeﺛﻢ ﻓﻘﺮة To User
ﺛﻢ اﺳﻢ اﻟﻤﺴﺘﺨﺪم) (Userاو ) ( Roleاﻟﺬى ﻳﻌﺒﺮ ﻋﻦ ﻣﻜﺎن ﺑﺔ ﻣﺠﻤﻮﻋﺔ ﻣﻦ
اﻟﺼﻼﺣﻴﺎت او ) (Publicوﺗﻌﺒﺮ ﻋﻦ اﻋﻄﺎء اﻟﺼﻼﺣﻴﺎت اﻟﻰ آﻞ اﻟﻤﺴﺘﺨﺪﻣﻴﻦ.
ﻣﺜﺎل:
*ﺗﻌﺮﻳﻒ : ROLE
هﻰ ﻋﺒﺎرة ﻋﻦ ﻣﺠﻤﻮﻋﺔ ﻣﻦ اﻟﺼﻼﺣﻴﺎت) (Privilegesاﻟﺘﻰ ﻳﻤﻜﻦ
ﻣﻨﺤﻬﺎ اﻟﻰ اﻟﻤﺴﺘﺨﺪم.وﻳﺘﻢ اﺳﺘﺨﺪام ROLLﻟﺘﺴﻬﻴﻞ ﻋﻤﻠﻴﺔ ﻣﻨﺢ
اﻟﺼﻼﺣﻴﺎت ). (Privileges
*ﻓﻜﺮة : ROLE
اﻟﻬﺪف ﻣﻦ اﻟﺮﺳﻢ اﻟﺴﺎﺑﻖ اﻋﻄﺎء ﻣﺠﻤﻮﻋﺔ ﻣﻦ اﻟﺼﻼﺣﻴﺎت ﻟﺒﻌﺾ
اﻟﻤﺴﺘﺨﺪﻣﻴﻦ.ﻻﺣﻆ ان آﻼ ﻣﻦ اﻟﺮﺳﻤﺘﻴﻦ ﻳﺤﻘﻘﻮا ﻧﻔﺲ اﻟﻬﺪف وﻟﻜﻦ
ﺑﺎﺳﺘﺨﺪام ROLLﺗﻜﻮن اﻟﻌﻤﻠﻴﺔ اﺳﻬﻞ وأوﺿﺢ.
ﻳﻤﻜﻨﻚ اﻋﺘﺒﺎر Rollﻣﺜﻼ ﻣﺴﺘﺨﺪم ﻳﺘﻢ اﻋﻄﺎءة ﻣﺠﻤﻮﻋﺔ ﻣﻦ
اﻟﺼﻼﺣﻴﺎت
وﺑﻌﺪ ذﻟﻚ ﻳﺘﻢ اﻋﻄﺎء ﺗﻠﻚ ROLLاﻟﺬى ﻳﺤﺘﻮى ﻋﻠﻰ ﻣﺠﻤﻮﻋﺔ ﻣﻦ
اﻟﺼﻼﺣﻴﺎت اﻟﻰ اى ﻣﺴﺘﺨﺪم.
ﻓﻔﻰ اﻟﻤﺜﺎل اﻟﺴﺎﺑﻖ ﻗﻤﻨﺎ ﺑﺎﻧﺸﺎء ROLLواﻋﻄﺎﺋﻬﺎ اﺳﻢ . manager
ﺑﻌﺪ ان ﻗﻤﻨﺎ ﺑﺎﻧﺸﺎء ROLLواﻋﻄﺎءة اﻟﺼﻼﺣﻴﺎت اﻟﻤﻨﺎﺳﻴﺔ ﻟﺔ ﻧﻘﻮم ﺑﺎﻋﻄﺎء ﺗﻠﻚ ROLL
اﻟﻰ اﻟﻤﺴﺘﺨﺪم ،وﺗﻢ اﻋﻄﺎء ROLLاﻟﻰ آﻼ ﻣﻦ DEHAANو . KOCHHAR
ﻣﺜﺎل:
ﻓﻰ اﻟﻤﺜﺎل اﻟﺴﺎﺑﻖ ﻗﺎم اﻟﻤﺴﺘﺨﺪم Scottﺑﺘﻐﻴﺮ اﻟﺮﻗﻢ اﻟﺴﺮى ﻟﺔ اﻟﻰ . Lion
Object Privilege
ﻳﻤﻜﻦ ﻟﻠﻤﺴﺘﺨﺪم ان ﻳﻌﻄﻰ ﺑﻌﺾ اﻟﺼﻼﺣﻴﺎت اﻟﻰ ﻣﺴﺘﺨﺪم اﺧﺮ ﺑﺸﺮط ان ﻳﻜﻮن
هﻮ ﺻﺎﺣﺐ . Schema
اﻟﺼﻴﻐﺔ اﻟﺮﺋﻴﺴﻴﺔ : Object Privilege
ﻣﺜﺎل:
ﺳﺤﺐ اﻟﺼﻼﺣﻴﺎت
ﻣﺜﺎل:
ارﺗﺒﺎط ﻗﺎﻋﺪة اﻟﺒﻴﻨﺎت ﺗﺴﻤﺢ ﻟﻠﻤﺴﺘﺨﺪﻣﻴﻦ اﻟﻤﺤﻠﻴﻴﻦ ﻟﻠﻮﺻﻮل إﻟﻲ ﺑﻴﻨﺎت ﻋﻠﻲ
ﻗﺎﻋﺪة ﺑﻴﺎﻧﺎت اﺧﺮى.