13.4. ROLE
A role is a database object that packages a set of privileges. Roles implement the concept of access control at a group level. Multiple privileges are granted to the role and then that role can be granted to or revoked from one or many users.
A user that is granted a role must supply that role in their login credentials in order to exercise the associated privileges. Any other privileges granted to the user directly are not affected by their login with the role. Logging in with multiple roles simultaneously is not supported.
In this section the tasks of creating and dropping roles are discussed.
13.4.1. CREATE ROLE
Used forCreating a new ROLE
object
Available inDSQL, ESQL
Syntax
|
CREATE ROLE rolename
| [SET SYSTEM PRIVILEGES TO <sys_privileges>]
|
|<sys_privileges> ::=
| <sys_privilege> [, <sys_privilege> ...]
|
|<sys_privilege> ::=
| USER_MANAGEMENT | READ_RAW_PAGES
| | CREATE_USER_TYPES | USE_NBACKUP_UTILITY
| | CHANGE_SHUTDOWN_MODE | TRACE_ANY_ATTACHMENT
| | MONITOR_ANY_ATTACHMENT | ACCESS_SHUTDOWN_DATABASE
| | CREATE_DATABASE | DROP_DATABASE
| | USE_GBAK_UTILITY | USE_GSTAT_UTILITY
| | USE_GFIX_UTILITY | IGNORE_DB_TRIGGERS
| | CHANGE_HEADER_SETTINGS
| | SELECT_ANY_OBJECT_IN_DATABASE
| | ACCESS_ANY_OBJECT_IN_DATABASE
| | MODIFY_ANY_OBJECT_IN_DATABASE
| | CHANGE_MAPPING_RULES | USE_GRANTED_BY_CLAUSE
| | GRANT_REVOKE_ON_ANY_OBJECT
| | GRANT_REVOKE_ANY_DDL_RIGHT
| | CREATE_PRIVILEGED_ROLES | GET_DBCRYPT_INFO
| | MODIFY_EXT_CONN_POOL | REPLICATE_INTO_DATABASE
CREATE ROLE
Statement ParameterParameter | Description |
---|---|
rolename | Role name. The maximum length is 63 characters |
sys_privilege | System privilege to grant |
The statement CREATE ROLE
creates a new role object, to which one or more privileges can be granted subsequently.
The name of a role must be unique among the names of roles in the current database.
It is advisable to make the name of a role unique among usernames as well. The system will not prevent the creation of a role whose name clashes with an existing username but, if it happens, the user will be unable to connect to the database.
13.4.1.1. Who Can Create a Role
The CREATE ROLE
statement can be executed by:
Users with the
CREATE ROLE
privilege, with the following caveatsSetting system privileges also requires the system privilege
CREATE_PRIVILEGED_ROLES
The user executing the CREATE ROLE
statement becomes the owner of the role.
13.4.1.2. CREATE ROLE
Examples
Creating a role named SELLERS
|
CREATE ROLE SELLERS;
Creating a role SELECT_ALL
with the system privilege to select from any selectable object
|
CREATE ROLE SELECT_ALL
| SET SYSTEM PRIVILEGES TO SELECT_ANY_OBJECT_IN_DATABASE;
See alsoSection 13.4.2, “ALTER ROLE
”, Section 13.4.3, “DROP ROLE
”, GRANT
, REVOKE
, Fine-grained System Privileges
13.4.2. ALTER ROLE
Used forAltering a role
Available inDSQL
Syntax
|
ALTER ROLE rolename
| { SET SYSTEM PRIVILEGES TO <sys_privileges>
| | DROP SYSTEM PRIVILEGES
| | {SET | DROP} AUTO ADMIN MAPPING }
|
|<sys_privileges> ::=
| !! See Section 13.4.1, “
CREATE ROLE
” !!
ALTER ROLE
Statement ParameterParameter | Description |
---|---|
rolename | Role name;
specifying anything other than |
sys_privilege | System privilege to grant |
ALTER ROLE
can be used to grant or revoke system privileges from a role, or enable and disable the capability for Windows Administrators to assume administrator privileges automatically when logging in.
This last capability can affect only one role: the system-generated role RDB$ADMIN
that exists in every database of ODS 11.2 or higher.
For details on auto admin mapping, see AUTO ADMIN MAPPING
.
It is not possible to selectively grant or revoke system privileges.
Only the privileges listed in the SET SYSTEM PRIVILEGES
clause will be available to the role after commit, and DROP SYSTEM PRIVILEGES
will remove all system privileges from this role.
13.4.2.1. Who Can Alter a Role
The ALTER ROLE
statement can be executed by:
Users with the
ALTER ANY ROLE
privilege, with the following caveatsSetting or dropping system privileges also requires the system privilege
CREATE_PRIVILEGED_ROLES
Setting or dropping auto admin mapping also requires the system privilege
CHANGE_MAPPING_RULES
13.4.2.2. ALTER ROLE
Examples
Drop all system privileges from a role named SELECT_ALL
|
ALTER ROLE SELLERS
| DROP SYSTEM PRIVILEGES;
Grant a role SELECT_ALL
the system privilege to select from any selectable object
|
ALTER ROLE SELECT_ALL
| SET SYSTEM PRIVILEGES TO SELECT_ANY_OBJECT_IN_DATABASE;
See alsoSection 13.4.1, “CREATE ROLE
”, GRANT
, REVOKE
, Fine-grained System Privileges
13.4.3. DROP ROLE
Used forDeleting a role
Available inDSQL, ESQL
Syntax
|
DROP ROLE rolename
The statement DROP ROLE
deletes an existing role.
It takes just a single argument, the name of the role.
Once the role is deleted, the entire set of privileges is revoked from all users and objects that were granted the role.
13.4.3.1. Who Can Drop a Role
The DROP ROLE
statement can be executed by:
The owner of the role
Users with the
DROP ANY ROLE
privilege
13.4.3.2. DROP ROLE
Examples
Deleting the role SELLERS
|
DROP ROLE SELLERS;
See alsoSection 13.4.1, “CREATE ROLE
”, GRANT
, REVOKE