Affects Version/s: None
Fix Version/s: None
Bug behavior facts:Security
Currently, managing users in Derby is awkward. The BUILTIN mechanism seems appropriate for testing purposes, but has problems in a production setting.
DERBY-866 describes part of a new mechanism for managing users. DERBY-866 may be part of the right solution--or it may not be. I think it would be worthwhile to step back from this issue and first describe at a high level what the customer experience should be. By introducing a new mechanism, we have the opportunity to think through the complete experience of user management. Here are my initial thoughts:
1) This mechanism is mutually exclusive with the currently supported settings of the derby.authentication.provider property.
2) There should be a super user who has the power to create, view, and drop users, including database owners. The design should let this super user delegate these powers to other users.
3) In the new mechanism it is sufficient that user credentials are system-wide.
4) Database owners should nevertheless have the power to state which usernames can connect to their databases. DBOs should also have the power to state who can shut down their databases. This mechanism should be extensible to managing other database-specific powers which fall outside the SQL spec. The design should let the DBO delegate these powers to other users.
5) Users should be able to change their own credentials whenever they want.
6) No password needed for this mechanism should be stored in plaintext anywhere on the system.
|Component/s||Security [ 11411 ]|
|Component/s||Services [ 11415 ]|
|Status||Open [ 1 ]||Closed [ 6 ]|
|Resolution||Duplicate [ 3 ]|
|Workflow||jira [ 12419426 ]||Default workflow, editable Closed status [ 12802107 ]|