Contents Index Restrictions and Other Security Concerns Security warnings

SQL Anywhere Studio Security Guide
  Restrictions and Other Security Concerns

Restrictions


This page describes operation of Adaptive Server Anywhere in a manner equivalent to a C2-security-certified configuration. It does not provide general-purpose information on the topic.

The following restrictions are required for Adaptive Server Anywhere to run in the certified C2 configuration.

  1. Do not delete, modify, or replace any files under the Adaptive Server Anywhere installation directory, with the following exceptions:

  2. Do not add any new files under the Adaptive Server Anywhere installation directory.

  3. The sybase account password should only be given to one person.

  4. The path for the sybase account should not contain any directories other than %SystemRoot%\system32, %SystemRoot%, and the Adaptive Server Anywhere win32 directory.

  5. Grant only the Login as a Service privilege to the sybase account.

  6. DBA authority is very powerful. Only grant DBA authority to those users who require it. The number of DBA users should be kept to a minimum. However, each person who requires DBA authority should be given a separate account with DBA authority granted to it (for example, do not use shared DBA accounts).

  7. DBAs who will be using the database outside of their DBA capacity should be given two different Adaptive Server Anywhere user accounts—one with DBA authority and one without. DBAs should only use the account with DBA authority when necessary.

  8. The password for the DBA account must be changed upon creation of a new database.

  9. The value for the min_password_length public option must be set to at least 6 upon creation of a new database.

  10. The database engine or server must be run as a Windows NT service. Adaptive Server Anywhere is only certified when running as a service.

  11. The following switches must be specified on the engine or server start line

    -sc -gd DBA -gk DBA -gl DBA -gu DBA
    -x namedpipes(TDS=NO)

    The engine or server start line is specified when executing the dbsvc utility, so these switches must be included in the Details part of the dbsvc command.

    For more information, see Service creation utility for details on dbsvc.

  12. Do not use the -x parameter to start up any ports other than Named Pipes. Adaptive Server Anywhere is only certified in a standalone environment.

  13. Do not grant REMOTE_DBA authority to any user.

  14. Do not grant execute permission on the following system procedures to any user or group:

  15. Do not create stored procedures or functions owned by any user with DBA authority.

  16. Do not create triggers on any tables owned by any user with DBA authority.

  17. Upgrade older databases by running the dbupgrad utility before using them.

    For more information about upgrading a database, see Upgrading a database using the dbupgrad command-line utility.

  18. Databases must use a transaction log file. Do not use the -n switch (no transaction log) when creating a database and do not execute dblog -n (do not use a transaction log or mirror) on a database.

  19. All database, transaction log, dbspace, write file, and mirror files should be stored in non-shared, protected directories.

    For guidelines on how to protect a directory, see Adaptive Server Anywhere software installation.

  20. The java.net package is disabled in the engine or server. Java running in the database will not be able to use this package.

  21. The java_input_output public option must always be set to OFF (the default).

  22. Do not create a database user called guest. Such a user would allow any Windows NT user to connect to the database using integrated login.

  23. Always set the login_mode public option to Integrated during database installation.

    For more information, see Creating a database.

  24. All connections to the database must use the integrated login mechanism. Standard connections to the database (that is, those specifying user ID and password) are not allowed in the certified configuration.

  25. All integrated login mappings must be one-to-one. No two Windows NT user names may be mapped to the same database user.

  26. Embedded SQL programs must not use the db_delete_file function because the name of the file being deleted is not audited.

  27. Do not grant SELECT access on sys.sysuserperm or sys.syslogin to any non-DBA user.


Contents Index Restrictions and Other Security Concerns Security warnings