Prev
Next
Chapter 6. How Difficult Is This?
Home
Chapter 7. Setting Up A
Veil2
Virtual Private Database - Overview
Part II. Creating Your Veil2-based VPD Step By Step
Table of Contents
7. Setting Up A
Veil2
Virtual Private Database - Overview
7.1. Checking The State of Your Implementation
8. Getting Started With
Veil2
(STEP 1)
8.1. Installing
Veil2
8.2. Next Steps
9. Identify and Define Your Scope Types (STEP 2)
9.1. Create Scope Type Records
9.2. Update Your Role Mapping Context (maybe)
10. Setting Up Authentication and Session Management (STEP 3)
10.1. Create Your Authentication Methods
10.2. Associate Accessors And Authentication Contexts
10.3. Define Your
my_get_accessor()
Function
10.4. Notes on Session Management
11. Link Your Users To
Veil2
's Accessors (STEP 4)
11.1. Create A Mapping Table With Foreign-Key Links to Your Users
11.2. Copy Existing User Records
11.3. Copy Existing Authentication Details
11.4. Create Referential Integrity Triggers
11.5. Ensure Authentication Changes Are Propagated
12. Link Your Scopes and Security Contexts (STEP 5)
12.1. Create Foreign Key Links
12.2. Create Insert Triggers
12.3. Create Update Triggers
12.4. Copy Existing Scopes Into The Links Table
12.5. Update the
all_accessor_roles
View
12.6. On Caches
13. Define Your Scope Hierarchy (STEP 6)
13.1. Customizing The
superior_scopes
View
13.2. Handle Refresh of Materialized Views
14. Create Initial Privileges (STEP 7)
15. Integrate And/Or Create Roles (STEP 8)
15.1. Integrating Existing Roles
15.2. Create New Roles and Mappings
15.3. Refreshing Materialized Views - Do Nothing
16. Secure Your Tables (STEP 9)
16.1. Doing It
16.2. The
Veil2
tables
17. Secure Your Views (STEP 10)
18. Assign Initial Roles (STEP 11)
18.1. Roles
19. Setup Housekeeping Tasks (STEP 12)