SECURITY OVERVIEW
Operations staff (ETSD) will perform all backup and recovery. They will also provide such items as (but not limited to) creating oracle grants, assigning oracle user-ids and passwords and creating database roles. Some security features are built into the application such as menu security, row level security and field level security. AQS maintains user profiles, their associated Screening Groups and the application roles.
Security is implemented through the use of roles. These roles are assigned access to application modules. All users will be assigned one or more user roles that will allow them access to application modules from the application menu. Because of the row level security requirements for the read only user, all users will only be allowed to access the database through the AQS application menu. Users will not be allowed to access the production system via other products such as SQLPLUS.
Database users will be authenticated by Oracle when they enter their user id and password. After this login process is complete the user will go to the AQS Session module where the user will select a Screening Group or choose to be a read only user.
Read Only User Mode and Sensitive Data
The only data that is considered sensitive is pre-production data and error data. Any user can query all other data as long as the user has chosen to be in Read Only mode.
ROW LEVEL SECURITY
Monitor Security is the process of assigning an owner to a monitor. The Screening Group number of the user who creates a monitor record, either through the batch process or the data maintenance process, is assigned to the new monitor. All functions that select, insert, update, or delete monitors must insure that the current user is in the same Screening Group that the monitor is assigned.
Special security rules:
Users can insert or update records on-line, if the record is related to a monitor and the monitors Screening Group matches the user's Screening Group.
A user can update a site if the user's Screening Group owns a monitor related to the site.
There are four common tasks that are performed from the security function. Simple instructions on them are included in the following help pages.
There are four tabs that make up the help form. These tabs are