Auditing impact on database utilities
- Last Updated: March 30, 2020
- 1 minute read
- OpenEdge
- Version 12.2
- Documentation
The need to guarantee the integrity of the audit trail requires that only authenticated users have access to the auditing data and policy tables. To ensure the guarantee, the use of certain database utilities is restricted to authenticated users.
Auditing incorporates user security into the database utilities. This addition implements the three primary aspects of security: authentication, authorization, and auditing. It is necessary to determine who is using the utility, if that user is allowed to perform the indicated action on the specified resource, and record the details of the action.
Not all database utilities require user security. The database utilities that do require this additional security meet one of the following criteria:
- The utility alters the status of database auditing
- The utility can alter the audit data or policies
- The utility can alter the database areas defined for audit data and indexes
Access to the utilities is acquired when the user is granted
a privileged auditing role. The user is identified by the database _User table,
or the operating system login (effective process user-id.) Depending
on the utility, the user must be granted the Audit Administrator
role or the Audit Data Archiver role. For information on the definitions
of these roles and how to grant auditing roles, see OpenEdge
Getting Started: Core Business Services - Security and Auditing or
the Data Administration online Help.