Return-Path: X-Original-To: apmail-db-derby-dev-archive@www.apache.org Delivered-To: apmail-db-derby-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 84FD36A3A for ; Tue, 28 Jun 2011 16:12:41 +0000 (UTC) Received: (qmail 85649 invoked by uid 500); 28 Jun 2011 16:12:41 -0000 Delivered-To: apmail-db-derby-dev-archive@db.apache.org Received: (qmail 85582 invoked by uid 500); 28 Jun 2011 16:12:40 -0000 Mailing-List: contact derby-dev-help@db.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: Delivered-To: mailing list derby-dev@db.apache.org Received: (qmail 85575 invoked by uid 99); 28 Jun 2011 16:12:40 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 28 Jun 2011 16:12:40 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=5.0 tests=ALL_TRUSTED,T_RP_MATCHES_RCVD X-Spam-Check-By: apache.org Received: from [140.211.11.116] (HELO hel.zones.apache.org) (140.211.11.116) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 28 Jun 2011 16:12:38 +0000 Received: from hel.zones.apache.org (hel.zones.apache.org [140.211.11.116]) by hel.zones.apache.org (Postfix) with ESMTP id 21D8D4373DF for ; Tue, 28 Jun 2011 16:12:17 +0000 (UTC) Date: Tue, 28 Jun 2011 16:12:17 +0000 (UTC) From: "Rick Hillegas (JIRA)" To: derby-dev@db.apache.org Message-ID: <432809187.2196.1309277537135.JavaMail.tomcat@hel.zones.apache.org> In-Reply-To: <553006576.44225.1309192007707.JavaMail.tomcat@hel.zones.apache.org> Subject: [jira] [Updated] (DERBY-5299) Document what you should expect to see if you enable authentication/authorization on a database which was created without those safeguards. MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 X-Virus-Checked: Checked by ClamAV on apache.org [ https://issues.apache.org/jira/browse/DERBY-5299?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Rick Hillegas updated DERBY-5299: --------------------------------- Attachment: derby-5299-01-aa-securingOldDatabase.tar derby-5299-01-aa-securingOldDatabase.diff Attaching a derby-5299-01-aa-securingOldDatabase.diff patch and corresponding tarball of generated html pages: derby-5299-01-aa-securingOldDatabase.tar. This patch adds a new section to the Developer's Guide, nested under the existing "Setting the SQL standard authorization mode" topic. The new section is titled "Upgrading an old database to use SQL standard authorization". The new section explains how to enable authentication and SQL authorization on an old, unsecured database. The new section also lists some behavioral differences which you will notice after upgrading your database this way. Touches the following files: M src/devguide/derbydev.ditamap A src/devguide/cdevcsecuresqlauthupgrade.dita > Document what you should expect to see if you enable authentication/authorization on a database which was created without those safeguards. > ------------------------------------------------------------------------------------------------------------------------------------------- > > Key: DERBY-5299 > URL: https://issues.apache.org/jira/browse/DERBY-5299 > Project: Derby > Issue Type: Improvement > Components: Documentation > Affects Versions: 10.9.0.0 > Reporter: Rick Hillegas > Assignee: Rick Hillegas > Attachments: 5299_setup.sql, 5299_withAuth.sql, derby-5299-01-aa-securingOldDatabase.diff, derby-5299-01-aa-securingOldDatabase.tar > > > It is possible to deploy the first version of your Derby-powered application without enabling authentication and authorization. In a later version of your application, you may want to boost security by enabling these features. It would be good to tell users what they should expect when they enable authentication/authorization on a legacy database. -- This message is automatically generated by JIRA. For more information on JIRA, see: http://www.atlassian.com/software/jira