Call: +44 (0)7759 277220 Call
Forum

Welcome, Guest. Please Login.
Nov 22nd, 2024, 3:44pm
News: Welcome to Pete Finnigan's Oracle security forum
Home | Help | Search | Members | Login
   Pete Finnigan's Oracle Security Forum
   Oracle Security
   Oracle Security
(Moderator: Pete Finnigan)
   Multiple OLS policy on a single table
« Previous topic | Next topic »
Pages: 1  Reply | Notify of replies | Send Topic | Print
   Author  Topic: Multiple OLS policy on a single table  (Read 2005 times)
Pete Finnigan
PeteFinnigan.com Administrator
*****




Oracle Security is easier if you design for it

   
View Profile | WWW | Email

Gender: male
Posts: 309
Multiple OLS policy on a single table
« on: Jan 13th, 2008, 7:40pm »
Quote | Modify

I have created an OLS policy and successfully implemented it on my five tables. Then I created one more OLS policy and tried to implement it on one of the five tables in addition to other policy. Second policy was also successfully created and applied to the table but when I tried to update the rows for the second policy it is not letting me update the rows with the data labels. Also after applying the second policy to the table, users who were able to access the data previously are no longer able to access data anymore. When I had only one policy on the table my users were able to access the data as they were supposed to. What am I doing wrong? I am stuck. I searched the forum for this but could not find any similar problem…. Please help me debug. If anything else is required, please let me know and I will try to provide it.
 
Thanks in advance…
 
I am putting my script here so it is easier to see what is going on. Here is my script:
 
EXEC sa_sysdba.create_policy ('DBSEC','Row_LBL','ALL_CONTROL');
EXEC sa_components.create_level ('DBSEC', 1001,'Public','Public Level');
EXEC sa_components.create_level ('DBSEC', 2001,'Sensitive','Sensitive Level');
EXEC sa_components.create_level ('DBSEC', 3001,'Confidential','Confidential Level');
 
EXEC sa_components.create_compartment ('DBSEC', 102,'HR', 'Human Resource');
EXEC sa_components.create_compartment ('DBSEC', 202,'SLS', 'Sales');
EXEC sa_components.create_compartment ('DBSEC', 302,'MRKT', 'Marketiing');
 
EXEC sa_components.create_group ('DBSEC', 40,'P','President');
EXEC sa_components.create_group ('DBSEC', 10,'MGR', 'Manager','P');
EXEC sa_components.create_group ('DBSEC', 20,'WEST','WEST_REGION','MGR');
EXEC sa_components.create_group ('DBSEC', 30,'EAST','EAST_REGION','MGR');
 
EXEC sa_label_admin.create_label('DBSEC', '10110','Public:SLS', TRUE);
EXEC sa_label_admin.create_label('DBSEC', '20220','Sensitive:SLS',TRUE);
EXEC sa_label_admin.create_label('DBSEC', '20330','Sensitive:HR,SLS:MGR', TRUE);
EXEC sa_label_admin.create_label('DBSEC', '20440','Confidential:HR,SLS:P',TRUE);
EXEC SA_POLICY_ADMIN.APPLY_TABLE_POLICY('DBSEC','db668a10','Employee',NULL);
EXEC SA_POLICY_ADMIN.APPLY_TABLE_POLICY('DBSEC','db668a10','Department',NULL) ;
 
BEGIN
SA_USER_ADMIN.SET_USER_LABELS
(policy_name => 'DBSEC',  
user_name => 'President',
max_read_label => 'Confidential:HR,SLS:P');
 
SA_USER_ADMIN.SET_USER_LABELS
(policy_name => 'DBSEC',  
user_name => 'Salesman1',
max_read_label => 'Public:SLS');
END;
/
EXEC SA_USER_ADMIN.SET_USER_PRIVS ('DBSEC','DB668A10','FULL,PROFILE_ACCESS');
conn db668a10/xyz
UPDATE Employee SET ROW_LBL = CHAR_TO_LABEL('DBSEC','Public:SLS') WHERE Dpt_NO = 40;
UPDATE Employee SET ROW_LBL = CHAR_TO_LABEL('DBSEC','Sensitive:HR,SLS:MGR') WHERE Dpt_NO = 10;  
UPDATE Employee SET ROW_LBL = CHAR_TO_LABEL('DBSEC','Confidential:HR,SLS:P') WHERE Emp_ID = 10475;
UPDATE Department SET ROW_LBL = CHAR_TO_LABEL('DBSEC','Public:SLS') WHERE Dpt_NO = 40;
UPDATE Department SET ROW_LBL = CHAR_TO_LABEL('DBSEC','Confidential:HR,SLS:P') WHERE Dpt_NO = 10;
 
-- Second Policy
EXEC sa_sysdba.create_policy ('DOC','ROWLBL','ALL_CONTROL');
EXEC sa_components.create_level ('DOC', 4001,'Public','Public Level');
EXEC sa_components.create_level ('DOC', 5001,'Sensitive','Sensitive Level');
EXEC sa_components.create_level ('DOC', 6001,'Confidential','Confidential Level');
EXEC sa_components.create_compartment ('DOC', 502,'HR', 'Human Resource');
EXEC sa_label_admin.create_label('DOC', '20500','Public:HR', TRUE);
EXEC sa_label_admin.create_label('DOC', '20600','Sensitive:HR', TRUE);
EXEC SA_POLICY_ADMIN.APPLY_TABLE_POLICY('DOC','db668a10','Department',NULL);
BEGIN
SA_USER_ADMIN.SET_USER_LABELS
(policy_name => 'DOC',  
user_name => 'HRmgr',
max_read_label => 'Sensitive:HR');
END;
/
EXEC SA_USER_ADMIN.SET_USER_PRIVS ('DOC','DB668A10','FULL,PROFILE_ACCESS');
conn db668a10/lakhmi8
UPDATE Department SET ROWLBL = CHAR_TO_LABEL('DOC','Public:HR') WHERE Dpt_NO = 10;
 
Here is the output I get after applying second policy:  
 
SQL> UPDATE Department SET ROWLBL = CHAR_TO_LABEL('DOC','Public:HR') WHERE Dpt_NO = 10;
 
0 rows updated.
 
SQL> DESC Department;
 Name        Null?    Type
 ----------------------------------------- -------- ----------------------------
 DPT_NO          NUMBER(6)
 DPT_NAME         NOT NULL CHAR(17)
 MGR_ID          NUMBER(6)
 HQ_CITY         CHAR(10)
 ROW_LBL         NUMBER(10)
 ROWLBL          NUMBER(10)
 
IP Logged

Pete Finnigan (email:pete@petefinnigan.com)
Oracle Security Web site: http://www.petefinnigan.com
Forum: http://www.petefinnigan.com/forum/yabb/YaBB.cgi
Oracle security blog: http://www.petefinnigan.com/weblog/entries/index.html
Pages: 1  Reply | Notify of replies | Send Topic | Print

« Previous topic | Next topic »

Powered by YaBB 1 Gold - SP 1.4!
Forum software copyright © 2000-2004 Yet another Bulletin Board
  • PFCLScan PFCLScan

    Simply connect PFCLScan to your Oracle database and it will automatically discover the security issues that could make your Oracle database vulnerable to attack and to the potential loss of your data.

  • PFCL Obfuscate PFCLObfuscate

    PFCLObfuscate is the only tool available that can automatically add license controls to your PL/SQL code. PFCLObfuscate protects your Intellectual Property invested in your PL/SQL database code.

  • PFCLCode PFCLCode

    PFCLCode is a tool to allow you to analyse your PL/SQL code for many different types of security issues. PFCLCode gives you a detailed review and reports and includes a powerful colour syntax highlighting code editor

  • PFCLForensics PFCLForensics

    PFCLForensics is the only tool available to allow you to do a detailed live response of a breached Oracle database and to then go on and do a detailed forensic analysis of the data gathered.

  • Products We resell PFCLReselling

    PeteFinnigan.com Limited has partnered with a small number of relevant companies to resell their products where they enhance or compliment what we do

  • PFCLATK PFCLATK

    PFCLATK is a toolkit that allows detailed pre-defined policy driven audit trails for your Oracle database. The toolkit also provides for a centralised audit trail and centralised activity reporting

  • PFCLCookie PFCLCookie

    PFCLCookie is a useful tool to use to audit your websites for tracking cookies. Scan websites in a natural way using powerful browser driven scanner

  • PFCL Training PFCLTraining

    PFCLTraining is a set of expert training classes for you, aimed at teaching how to audit your own Oracle database, design audit trails, secure code in PL/SQL and secure and lock down your Oracle database.

  • PFCL Services PFCLServices

    Choose PFCLServices to add PeteFinnigan.com Ltd to your team for your Oracle Security needs. We are experts in performing detailed security audits, data security design work and policy creation

  • PFCLConsulting PFCLConsulting

    Choose PFCLConsulting to ask PeteFinnigan.com Limited to set up and use our products on your behalf

  • PFCLCustom PFCLCustom

    All of our software products can be customised at a number of levels. Choose this to see how our products can be part of your products and services

  • PFCLCloud PFCLCloud

    Private cloud, public cloud, hybrid cloud or no cloud. Learn how all of our services, trainings and products will work in the cloud

  • PFCLUserRights PFCLUserRights

    PFCLUserRights allows you to create a very detailed view of database users rights. The focus of the reports is to allow you to decide what privileges and accounts to keep and which to remove.

  • PFCLSTK PFCLSTK

    PFCLSTK is a toolkit application that allows you to provide database security easily to an existing database. PFCLSTK is a policy driven toolkit of PL/SQL that creates your security

  • PFCLSFTK PFCLSFTK

    PFCLSFTK is a toolkit that solves the problem of securing third party applications written in PL/SQL. It does this by creating a thin layer between the application and database and this traps SQL Injection attempts. This is a static firewall.

  • PFCLSEO PFCLSEO

    PFCLSEO is a web scanner based on the PFCLScan technology so that a user can easily scan a website for technical SEO issues