Configuring label-based access control
The general procedure involves a few SQL-based tasks that define precise but flexible database security objects.
Before you begin
About this task
Procedure
- The database server administrator (DBSA) grants the DBSECADM role.
- The DBSECADM defines the security objects:
- Creates security label components to define the attributes of sensitive data and the corresponding attributes of users who can have read access or write access to this data.
- Creates security policies to reflect the organization's restrictions about who can access protected data.
- Creates security labels for the security policies.
- Grants security labels to users who must have access to the protected data.
- To protect new tables: Uses the CREATE TABLE statement with the SECURITY POLICY clause and specifies how security objects protect data at the row level, column level, or at both levels.
- To protect existing tables: Uses the ALTER TABLE statement with the ADD SECURITY POLICY clause and specifies how security objects protect data at the row level, column level, or at both levels.
Tables to exclude from LBAC protection
What to do next
- virtual-table interface (VTI) tables
- tables with virtual-index interface (VII)
- temporary (TEMP) tables
- typed tables
- hierarchical tables