当前位置:网站首页>How to manage the authority of database account?
How to manage the authority of database account?
2020-11-06 21:19:00 【Jack088】
How to achieve the fine management of database account authority ?
@ Li Qianhong
According to the responsibilities of employees , Sub authority . You can plan a table for yourself , What kind of authority does each department of the company need , What rights does everyone need .( Generally speaking , Give some general accounts ) People who don't need to be given . If a particular leader or employee needs a certain authority , You need to apply to the management department , Indicate what it is , What is the effect of doing this , When to use , When it's not used , Remember to take it back on time .
@ Wen guobing
What is refinement , It must be the full control of authority . Let me share my experience .
First of all , Depending on the type of account , Distinguish by prefix . Simple classification , It is divided into business account and real name account . In terms of subdivision , Business accounts are divided into website applications 、 Mobile phone application 、 Report application 、 Service application 、 Query service , Real name accounts can be traced to specific employees .
Web application (web_ Business abbreviation )
Mobile phone application (mob_ Business abbreviation )
Report application (rep_ Business abbreviation )
Service application (dae_ Business abbreviation )
Query service (sea_ Business abbreviation )
Real name query (dev_ Name Pinyin )
second , The business account permission is up to SELECT、UPDATE、DELETE and INSERT, Query service and real name query account can only have query authority . Each user has only one password , You need to know whether the user exists when you authorize , If there is , Use the old password to authorize , If it doesn't exist , Generate random password for authorization .
Third , Real name permission can only be queried by fortress machine or springboard machine , Bastion machine has user login and execution SQL journal .
Fourth , on-line IDC Databases are only allowed online Web Machine connection , The tester is not allowed to connect to .
The fifth , Employees need to apply for work order for permission , Authorization can only DBA operation .DBA Need to do a good job in authority control , The person in charge of relevant business can apply for higher authority , But it needs to be copied by email to the higher level leaders for approval .
The sixth ,DBA There's a complete metabase , It records all the user related information , This database has the highest level of importance , Do a good job in safety control .
The seventh , The user's password needs to be complex enough , And there is a complete set of random password generation rules .
The eighth , The business side notifies that the business account is abnormal , There needs to be a process to quickly change accounts .
The ninth , Temporary high authority account number applied by the employee , There needs to be a record , Need to set password expiration time , And you need to develop a recycling process .
The first ten ,MySQL root The code is only DBA Have , And it is not allowed to save this password on any cloud notes or cloud storage , Can only be saved locally . in addition , Regular modification MySQL root password .
The eleventh , Enter through the terminal MySQL, It is not allowed to display the password in clear text .
twelfth , User authorization is recommended in Web Page completion , Safety control is needed . That is to say DB Operation and maintenance management platform , Need to code to implement .
thirteenth , Do a good job of data backup , The fastest way to recover data is through data manipulation .
fourteenth , If possible , Go online in a new business MySQL Audit program , Can pass init-connect Parameters + access_log + binlog Achieve audit .
above .
@ Han Chengliang
The two above are already very detailed , About refinement , The main reason is that each authority is assigned carefully , Achieve , No repetition , Secondly, the definition of authority is clear , What authority should be given to what authority , There are no fuzzy permissions , Finally, the record of authority , Start with authority , The examination and approval , to grant authorization , Take back , Delete and so on a whole set of rules and procedures , The most important thing is a refined idea , Know what you know .
@mountainsun
In terms of specific databases DB2 It is more difficult to achieve a very fine account management , because DB2 All users are operating system users , In the actual production system , It is generally impossible for us to build many users on the system . and ORACLE and MYSQL It's the user who uses the database , It is possible to allocate appropriate database operation permissions according to permissions .
版权声明
本文为[Jack088]所创,转载请带上原文链接,感谢
边栏推荐
- Building a new generation cloud native data lake with iceberg on kubernetes
- 美团内部讲座|周烜:华东师范大学的数据库系统研究
- With this artifact, quickly say goodbye to spam messages
- Analysis of serilog source code -- how to use it
- 谷歌浏览器实现视频播放加速功能
- The native API of the future trend of the front end: web components
- ES6 learning notes (3): teach you to use js object-oriented thinking to realize the function of adding, deleting, modifying and checking tab column
- 意派Epub360丨你想要的H5模板都在这里,电子书、大转盘、红包雨、问卷调查……
- An article will take you to understand SVG gradient knowledge
- git远程库回退指定版本
猜你喜欢
2020-08-19:TCP是通过什么机制保障可靠性的?
Zero basis to build a web search engine of its own
2020-08-14:数据任务的执行引擎用的哪些?
window系统 本机查找端口号占用方法
Small program introduction to proficient (2): understand the four important files of small program development
检测证书过期脚本
2020-08-29:进程线程的区别,除了包含关系之外的一些区别,底层详细信息?
Zero basis to build a web search engine of its own
嘉宾专访|2020 PostgreSQL亚洲大会阿里云数据库专场:曾文旌
Diamond standard
随机推荐
Introduction to Huawei cloud micro certification examination
Isn't data product just a report? absolutely wrong! There are university questions in this category
Novice guidance and event management system in game development
ORA-02292: 违反完整约束条件 (MIDBJDEV2.SYS_C0020757) - 已找到子记录
2020-08-30:裸写算法:二叉树两个节点的最近公共祖先。
Zero basis to build a web search engine of its own
2020 database technology conference helps technology upgrade
大数据处理黑科技:揭秘PB级数仓GaussDB(DWS) 并行计算技术
ES6 learning notes (3): teach you to use js object-oriented thinking to realize the function of adding, deleting, modifying and checking tab column
To teach you to easily understand the basic usage of Vue codemirror: mainly to achieve code editing, verification prompt, code formatting
An article will take you to understand SVG gradient knowledge
With this artifact, quickly say goodbye to spam messages
STM32F030F4P6兼容灵动微MM32F031F4P6
window系统 本机查找端口号占用方法
Code generator plug-in and creator preform file analysis
如何对数据库账号权限进行精细化管理?
The role of theme music in games
Multi robot market share solution
Small program introduction to proficient (2): understand the four important files of small program development
An article will introduce you to CSS3 background knowledge