Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What security is built into VirtUoso?

built security Virtuoso
0
Posted

What security is built into VirtUoso?

0

• Standard SQL-92 GRANT/REVOKE statements for DB users. • Access control lists for incoming clients based on source IP. • Each incoming connection can be passed to a hook function (a VirtUoso/PL stored procedure) for custom security measures. • SSL TLS is available for both ODBC and JDBC clients • x509 certificates for both ODBC and JDBC • For HTTP/DAV/SOAP Access • By default, requests for resources contained within the DAV repository are checked using HTTP/1.1 Digest authentication, using credentials stored in system users tables. • A UNIX-like permission mechanism is used to control access to contents of DAV repository, these permissions apply to users and groups of users. • BASIC and HTTP/1.1 Digest authentication. • Custom authentication methods may be implemented via an authentication hook API. Database: • Role Based Security Web Services: • WS-Security – enabling the use of symmetric and asymmetric encryption, digital signing, and identity authentication as defined by the WS-Sec

0

For ODBC/JDBC Access: • Standard SQL-92 GRANT/REVOKE statements for DB users. • Access control lists for incoming clients based on source IP. • Each incoming connection can be passed to a hook function (a Virtuoso/PL stored procedure) for custom security measures. • SSL TLS is available for both ODBC and JDBC clients • x509 certificates for both ODBC and JDBC • For HTTP/DAV/SOAP Access • By default, requests for resources contained within the DAV repository are checked using HTTP/1.1 Digest authentication, using credentials stored in system users tables. • A UNIX-like permission mechanism is used to control access to contents of DAV repository: these permissions apply to users and groups of users. • BASIC and HTTP/1.1 Digest authentication. • Custom authentication methods may be implemented via an authentication hook API. Database: • Role-Based Security Web Services: • WS-Security – enabling the use of symmetric and asymmetric encryption, digital signing, and identity authentication as

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123