Home > English > Application level Security – Part II (Database model)

Application level Security – Part II (Database model)

Now that we have covered business requirements and the usage scenario, let’s go further and look at the data model and what it takes to implement this.

The following is an entity-relationship diagram of the security portion of the system. These tables are all that are required to implemented the security requirements outlined in the previous series post.

Let’s review each table and see how each plays its part in the security model in the table below:

Table Name Purpose
sec_u_User Holds pertinent user information. Represents any user accessing the system.
sec_r_Role Defines the group of screens that can be rolled up into a role. A role can be associated with one or more screens.
sec_s_Screen Represents actual screens in the system.
sec_su_ScreenUser The explicit permissions for any given user at the screen level.
sec_sr_ScreenRole The permissions for a given role.
sec_ur_UserRole User can belong to multiple roles as well as roles can have multiple users.
sec_m_Menu Represents the menus in the system. Menus are associated with screens for navigation.
sec_uia_UserInstalledApplication In this system, there are multiple applications and user accounts can be granted access at the application level.
mr_xa_Application The system is comprised of multiple applications. An application can easily be associated as a Line Of Business (LOB) aspect of the system, e.g. Operations and Utility Billing would be two separate LOBs.

Hopefully, you can start to see how each piece plays its part. Not every table would be required in your scenario but I like to be able to control a lot of my security behavior via the database so that I don’t need to recompile and deploy with every little change.

In the next post we will examine screens and how they are implemented in the system.

Advertisements
Categories: English Tags: ,
  1. August 27, 2011 at 12:15 am

    I liked your article is an interesting technology
    thanks to google I found you

  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: