SQL Language Extension: CREATE/ALTER/CREATE_OR_ALTER/DROP MAPPING


Implements capability to control mapping of security objects to and between databases.



Author:

Alex Peshkoff <peshkoff@mail.ru>



Preamble:


Firebird 3 supports multiple security databases. This is great feature, but it raises some problems, missing in systems with single security database. Clusters of databases, using same security database, are efficiently separated and this is what we typically want to achieve using different security databases. But in some cases we need controlled limited interaction between such clusters. As an examples can be provided EXECUTE STATEMENT ON EXTERNAL DATA SOURCE when some data exchange between clusters is required and letting server-wide SYSDBA access databases from other clusters using services. More or less similar problems were already known in windows version of firebird since v. 2.1 due to presence of trusted windows authentication – we had 2 separate lists of users (in security database and OS) and sometimes it was needed to make them be related. For example it appears to be good idea to automatically assign to windows users from some group appropriate firebird role.


Single solution for all this problems is MAPPING login information, assigned to user when it connected to firebird server, to internal security objects in database – current_user and current_role. Mapping rule contains 4 parts of information:

Here it's necessary to mention that all versions of firebird had one hardcoded global default rule – users authenticated in security database are always mapped into any database one-to-one. This rule is safe - if we have some security database it makes no use not to trust itself. Therefore (and due to backward compatibility) this rule is kept as is in firebird 3. What about mapping windows users to current_user (which was enabled by default in 2.1 & 2.5 when trusted authentication enabled) in firebird 3 it must be done explicitly. This is required for systems with multiple security databases - not all of them need/use windows trusted authentication.


'From' part of mapping has 4 items:

Each item may be ignored (any item is accepted) except type – it's definitely bad idea to mix different types of security objects.


'To' part has 2 items:


Mappings are defined using SQL (DDL) commands.



Syntax:


{CREATE | ALTER | CREATE OR ALTER} [GLOBAL] MAPPING name USING {PLUGIN name [IN database] | ANY PLUGIN [IN database | SERVERWIDE] | MAPPING [IN database] | '*' [IN database]} FROM {ANY type | type name} TO {USER | ROLE} [name]


DROP [GLOBAL] MAPPING



Description:


Each mapping may be tagged as GLOBAL. Pay attention that global and local maps with same name may exist and they are different objects!


Create, alter and create or alter commands use same set of options. Name of mapping is used to identify it in former DDL commands. USING clause has a most complicated set of options. One can provide explicit plugin name, making it work only for given plugin, or make it use any plugin (but not a result of previous mappings), or make it work only with server-wide plugins, or make it work only with previous mapping results, or let it use any method using asterisk. In almost all cases (except server-wide authentication which is not related with databases) one can also provide name of database in which name from which mapping is performed was “born”. FROM clause must set required parameter – type of name from which mapping is done. When mapping names from plugins type is defined by plugin, when previous mapping results - type can be only user or role. One can provide explicit name which will be taken into an account by this mapping or use ANY keyword to work with any name of given type. In TO clause USER or ROLE (to what mapping is done) must be specified, name is optional - when it is not provided original name (from what mapping is done) is used.



Samples:


All sample are provided for CREATE command, use of ALTER is exactly the same, use of DROP is obvious.


Enable use of windows trusted authentication in all databases, using current security database:

CREATE GLOBAL MAPPING TRUSTED_AUTH USING PLUGIN WIN_SSPI FROM ANY USER TO USER;


Enable SYSDBA-like access for windows admins:

CREATE MAPPING WIN_ADMINS USING PLUGIN WIN_SSPI FROM Predefined_Group DOMAIN_ANY_RID_ADMINS TO ROLE RDB$ADMIN;

(there is no group DOMAIN_ANY_RID_ADMINS in windows, but such name is added by win_sspi plugin to provide exact backwards compatibility)


Enable particular user from other database access current database with other name:

CREATE MAPPING FROM_RT USING PLUGIN SRP IN "rt" FROM USER U1 TO USER U2;

(providing database names/aliases in double quotes is important for file name case-sensitive operating systems)


Enable server's SYDBA (from main security database) access current database assuming I has non-default security database:

CREATE MAPPING DEF_SYSDBA USING PLUGIN SRP IN "security.db" FROM USER SYSDBA TO USER;


Force people who logged in using legacy authentication plugin have not too much rights:

CREATE MAPPING LEGACY_2_GUEST USING PLUGIN legacy_auth FROM ANY USER TO USER GUEST;



Notice:


Global mapping works best if firebird 3 or higher version database is used as security database. If you plan to use other database as security one (using for example your own provider) please create in it table RDB$MAP with structure repeating one in firebird 3 database and SYSDBA-only write access.