November 5, 2008 at 2:53 am
Hi,
We host client data on our site on sql server 2005 dbs. We have a client that wants to create a linked server to one of these sql server dbs via a linked server (or anything which gives them the ability to pull data).
The data being transmitted from our systems needs to be secured somehow.
..Is it possible to create a linked server over https or tls?
Any suggestions on a potential solution would be much appreciated.
thanks
David
November 5, 2008 at 3:16 am
da (11/5/2008)
Hi,We host client data on our site on sql server 2005 dbs. We have a client that wants to create a linked server to one of these sql server dbs via a linked server (or anything which gives them the ability to pull data).
The data being transmitted from our systems needs to be secured somehow.
..Is it possible to create a linked server over https or tls?
Any suggestions on a potential solution would be much appreciated.
thanks
David
Https servers are for the Web related security. Facilitating for creating linked servers means your dB credentials will also expose there.
Set the permissions for that particular user and expose only the required tables
kshitij kumar
kshitij@krayknot.com
www.krayknot.com
November 5, 2008 at 3:33 am
Hi kshitij,
thanks for this. can you please provide a brief overview of how this is done (architecture).
Does the remote oracle db connect to the sql server over https (port 443) using a sql server login credentials?
...fyi - I would give the remote oracle db permissions to run a few stored procs.
thanks.
david
November 5, 2008 at 3:43 am
da (11/5/2008)
Hi kshitij,thanks for this. can you please provide a brief overview of how this is done (architecture).
Does the remote oracle db connect to the sql server over https (port 443) using a sql server login credentials?
...fyi - I would give the remote oracle db permissions to run a few stored procs.
thanks.
david
well, i dont have any deep knowledge for oracle, but for creating permissions for the access of tables for the specific users. the syntax would be like
This example grants the SELECT permission on the authors table to Kshitij
GRANT SELECT ON authors TO Kshitij
The following example denies the user Kshitij SELECT permissions to the authors table:
DENY SELECT ON authors TO Kshitij
The following example revokes SELECT permissions to the authors table from the user, Kshitij:
REVOKE SELECT ON authors TO Kshitij
Use the WITH GRANT OPTION setting very carefully, because in this case users can grant permissions to the objects to other users and it will be more difficult to manage security.
Do not grant the superfluous permissions to the public role, because each database user has the public role's permissions.
You can also use Views
kshitij kumar
kshitij@krayknot.com
www.krayknot.com
November 5, 2008 at 3:55 am
Hi,
Im interested in how the 2 dbs would be configured to communicate with each other securely.
For this to be a secure connection - the remote oracle db would connect to the sql server over https. i.e. port 443. Is this possible? is it also possible to connect to the sql server on port 1433?
thanks
November 7, 2008 at 4:15 am
From Oracle side you have two options:
Oracle Transparency Gateway for SQL Server, which provide more functionalities at high cost. As the name state it should provide transparency, like you are connected to SSQL 2K5 with Native Client. I am not sure, but it should provide all MSSQL Native Client connection possibilities.
The free option is to use HETEROGENEOUS SERVICES connection which uses ODBC. I think it's goes on 1433, you could use VPN or similar tunneling for encrypted data transfer.
Viewing 6 posts - 1 through 5 (of 5 total)
You must be logged in to reply to this topic. Login to reply