equal
deleted
inserted
replaced
|
1 ; |
|
2 ; This security policy file is used by the DBMS security tests. |
|
3 ; There are 5 different DBMS tests: |
|
4 ; (1) - A test application with capabilities, which satisfy database's schema security policy. |
|
5 ; (2) - A test application with capabilities, which satisfy database's write security policy. |
|
6 ; (3) - A test application with capabilities, which satisfy read security policy of table "A". |
|
7 ; (4) - A test application with capabilities, which satisfy write security policy of table "B", although they cannot satisfy (UID: WRITE) policy. |
|
8 ; (5) - A test application without capabilities. |
|
9 ; |
|
10 [database] |
|
11 read |
|
12 capability = None |
|
13 write |
|
14 capability = WriteUserData |
|
15 schema |
|
16 capability = NetworkServices |
|
17 |
|
18 [table] |
|
19 name = A |
|
20 read |
|
21 capability = PowerMgmt |
|
22 |
|
23 [table] |
|
24 name = B |
|
25 write |
|
26 capability = WriteDeviceData |
|
27 |
|
28 ;Table C |
|
29 ; It has explicitly specified security policies, so the database R/W security policies |
|
30 ; will be used when table C is accessed. |