Security and Permissions Overview
Database security and permissions are key aspects to ensure that the database system and the data stored in it are protected and managed. It involves a range of policies, measures and permission controls to ensure that only authorized users can access, modify and operate the database. This chapter will introduce you to the security and permission management system of the MatrixOne Intelligence database.
Database Security Management
The goal of MatrixOne Intelligence database security is to protect the database from unauthorized access, data breaches, data tampering, and other security threats. MatrixOne Intelligence provides the following capabilities to ensure database security:
- Identity authentication and authentication: Improve database security through identity identification, authentication, user, role and password management.
- Access control: Use authentication and authorization mechanisms to restrict only authorized users from accessing the database system and specific data objects.
- Data transmission encryption: By encrypting data transmission, ensure that the content during data transmission will not be listened to, decrypted and read.
- Audit and logging: Monitor database activity, log access and operation logs to track exceptional behavior and conduct audits.
Database permission management
MatrixOne Intelligence Database permission management is a process of managing user access and operational permissions to the database. With fine-grained permission control, it is ensured that each user can only perform what they need and limit access to sensitive data. Database permission management for MatrixOne Intelligence includes the following aspects:
- User Roles and Permissions Assignment: Assign users to different roles, each with different permission levels, and then associate permissions with roles to simplify permission management.
- Object-level permissions: Define user access and operation permissions to specific database objects (such as tables, views), ensuring that users can only perform operations within their authorization scope.
- Permission inheritance and inheritance control: Through the inheritance mechanism, the permissions of the role are passed to the user or other roles, and control them to ensure the correct inheritance and management of the permissions.
Password Management
In order to protect the security of user passwords, MatrixOne supports password management capabilities:
- Password complexity policy: Users are required to set strong passwords to prevent empty passwords and weak passwords.
MatrixOne recommends that users set complex passwords to ensure the security of their accounts.
- Suggested complexity: uppercase letters, lowercase letters, numbers and special symbols.
- Suggested length: not less than 8 digits.