SlideShare a Scribd company logo

Overview of RedDatabase 2.5

Mind The Firebird
Mind The Firebird
Mind The FirebirdLead at charity

"Overview of RedDatabase 2.5", by Roman Simakov, RedSoft

Overview of RedDatabase 2.5

1 of 30
Download to read offline
Overview of Red Database 2.5 
Roman Simakov, director of system development department 
RED SOFT CORPORATION
About company 
• Red Soft Corporation was founded in 2006 
• All solutions based on Open Source code 
• The main product is Red Database 
2
Development process (schema) 
3 
Firebird 
repository 
Red Soft 
repository 
merged commits 
conflict commits resolved commits 
Developer 
Firebird Developer 
Developer 
direct commits 
local commits
QA process 
4 
Repository 
server 
Jenkins 
server 
Snapshots 
Release Candidates 
Releases 
Developer 
Test manager 
Commit changes 
Pull changes and run build jobs 
View test result 
Publish builds
Security features 
5 
• Cryptographic plugin 
• Multi-factor 
authentication 
• Cumulative roles 
• DML access control 
• DDL access control 
• Service access control 
• Record filtering 
Functional features 
• Java Stored Procedures 
• Full Text Search 
• OpenLDAP integration 
• StandBy cluster (engine-level 
replication)
Cryptographic plugin 
• It's a key feature used in other features to perform 
cryptographic operations. 
• It allows users to use necessary cryptographic 
methods required in different countries by using related 
plugins. 
• For Russia CryptoPro library and Windows CryptoAPI 
are supported. 
6
Ad

Recommended

Data Retrieval over DNS in SQL Injection Attacks
Data Retrieval over DNS in SQL Injection AttacksData Retrieval over DNS in SQL Injection Attacks
Data Retrieval over DNS in SQL Injection AttacksMiroslav Stampar
 
Pandora FMS: DB2 Enterprise Plugin
Pandora FMS: DB2 Enterprise PluginPandora FMS: DB2 Enterprise Plugin
Pandora FMS: DB2 Enterprise PluginPandora FMS
 
Oracle Basics and Architecture
Oracle Basics and ArchitectureOracle Basics and Architecture
Oracle Basics and ArchitectureSidney Chen
 
PostgreSQL Database Slides
PostgreSQL Database SlidesPostgreSQL Database Slides
PostgreSQL Database Slidesmetsarin
 
Oracle 12c Multi Tenant
Oracle 12c Multi TenantOracle 12c Multi Tenant
Oracle 12c Multi TenantRed Stack Tech
 
Direct SGA access without SQL
Direct SGA access without SQLDirect SGA access without SQL
Direct SGA access without SQLKyle Hailey
 
Basic - Oracle Edition Based Redefinition Presentation
Basic - Oracle Edition Based Redefinition PresentationBasic - Oracle Edition Based Redefinition Presentation
Basic - Oracle Edition Based Redefinition PresentationN/A
 
Essential Linux Commands for DBAs
Essential Linux Commands for DBAsEssential Linux Commands for DBAs
Essential Linux Commands for DBAsGokhan Atil
 

More Related Content

What's hot

Database administration commands
Database administration commands Database administration commands
Database administration commands Varsha Ajith
 
FIXING BLOCK CORRUPTION (RMAN) on 11G
FIXING BLOCK CORRUPTION (RMAN) on 11GFIXING BLOCK CORRUPTION (RMAN) on 11G
FIXING BLOCK CORRUPTION (RMAN) on 11GN/A
 
Oracle Database 12.1.0.2 New Features
Oracle Database 12.1.0.2 New FeaturesOracle Database 12.1.0.2 New Features
Oracle Database 12.1.0.2 New FeaturesAlex Zaballa
 
DB2 Basic Commands - UDB
DB2 Basic Commands - UDBDB2 Basic Commands - UDB
DB2 Basic Commands - UDBSrinimf-Slides
 
SQLMAP Tool Usage - A Heads Up
SQLMAP Tool Usage - A  Heads UpSQLMAP Tool Usage - A  Heads Up
SQLMAP Tool Usage - A Heads UpMindfire Solutions
 
Sql injection with sqlmap
Sql injection with sqlmapSql injection with sqlmap
Sql injection with sqlmapHerman Duarte
 
DOAG - Oracle Database Locking Mechanism Demystified
DOAG - Oracle Database Locking Mechanism Demystified DOAG - Oracle Database Locking Mechanism Demystified
DOAG - Oracle Database Locking Mechanism Demystified Pini Dibask
 
Percona Live 2017 ­- Sharded cluster tutorial
Percona Live 2017 ­- Sharded cluster tutorialPercona Live 2017 ­- Sharded cluster tutorial
Percona Live 2017 ­- Sharded cluster tutorialAntonios Giannopoulos
 
A DBA’s guide to using TSA
A DBA’s guide to using TSAA DBA’s guide to using TSA
A DBA’s guide to using TSAFrederik Engelen
 
Oracle-L11 using Oracle flashback technology-Mazenet solution
Oracle-L11 using  Oracle flashback technology-Mazenet solutionOracle-L11 using  Oracle flashback technology-Mazenet solution
Oracle-L11 using Oracle flashback technology-Mazenet solutionMazenetsolution
 

What's hot (20)

Database administration commands
Database administration commands Database administration commands
Database administration commands
 
FIXING BLOCK CORRUPTION (RMAN) on 11G
FIXING BLOCK CORRUPTION (RMAN) on 11GFIXING BLOCK CORRUPTION (RMAN) on 11G
FIXING BLOCK CORRUPTION (RMAN) on 11G
 
Oracle Database 12.1.0.2 New Features
Oracle Database 12.1.0.2 New FeaturesOracle Database 12.1.0.2 New Features
Oracle Database 12.1.0.2 New Features
 
Postgre sql unleashed
Postgre sql unleashedPostgre sql unleashed
Postgre sql unleashed
 
Sqlmap
SqlmapSqlmap
Sqlmap
 
Oracle ORA Errors
Oracle ORA ErrorsOracle ORA Errors
Oracle ORA Errors
 
DB2 Basic Commands - UDB
DB2 Basic Commands - UDBDB2 Basic Commands - UDB
DB2 Basic Commands - UDB
 
SQLMAP Tool Usage - A Heads Up
SQLMAP Tool Usage - A  Heads UpSQLMAP Tool Usage - A  Heads Up
SQLMAP Tool Usage - A Heads Up
 
Sql injection with sqlmap
Sql injection with sqlmapSql injection with sqlmap
Sql injection with sqlmap
 
DOAG - Oracle Database Locking Mechanism Demystified
DOAG - Oracle Database Locking Mechanism Demystified DOAG - Oracle Database Locking Mechanism Demystified
DOAG - Oracle Database Locking Mechanism Demystified
 
Sqlmap
SqlmapSqlmap
Sqlmap
 
DB2UDB_the_Basics
DB2UDB_the_BasicsDB2UDB_the_Basics
DB2UDB_the_Basics
 
Db health check
Db health checkDb health check
Db health check
 
Percona Live 2017 ­- Sharded cluster tutorial
Percona Live 2017 ­- Sharded cluster tutorialPercona Live 2017 ­- Sharded cluster tutorial
Percona Live 2017 ­- Sharded cluster tutorial
 
Hive commands
Hive commandsHive commands
Hive commands
 
Oracle 10g Introduction 1
Oracle 10g Introduction 1Oracle 10g Introduction 1
Oracle 10g Introduction 1
 
A DBA’s guide to using TSA
A DBA’s guide to using TSAA DBA’s guide to using TSA
A DBA’s guide to using TSA
 
Sql Injection 0wning Enterprise
Sql Injection 0wning EnterpriseSql Injection 0wning Enterprise
Sql Injection 0wning Enterprise
 
Android Data Persistence
Android Data PersistenceAndroid Data Persistence
Android Data Persistence
 
Oracle-L11 using Oracle flashback technology-Mazenet solution
Oracle-L11 using  Oracle flashback technology-Mazenet solutionOracle-L11 using  Oracle flashback technology-Mazenet solution
Oracle-L11 using Oracle flashback technology-Mazenet solution
 

Viewers also liked

A year in the life of Firebird .Net provider
A year in the life of Firebird .Net providerA year in the life of Firebird .Net provider
A year in the life of Firebird .Net providerMind The Firebird
 
Using ТРСС to study Firebird performance
Using ТРСС to study Firebird performanceUsing ТРСС to study Firebird performance
Using ТРСС to study Firebird performanceMind The Firebird
 
Orphans, Corruption, Careful Write, and Logging
Orphans, Corruption, Careful Write, and LoggingOrphans, Corruption, Careful Write, and Logging
Orphans, Corruption, Careful Write, and LoggingMind The Firebird
 
Using Azure cloud and Firebird to develop applications easily
Using Azure cloud and Firebird to develop applications easilyUsing Azure cloud and Firebird to develop applications easily
Using Azure cloud and Firebird to develop applications easilyMind The Firebird
 
Creating logs for data auditing in FirebirdSQL
Creating logs for data auditing in FirebirdSQLCreating logs for data auditing in FirebirdSQL
Creating logs for data auditing in FirebirdSQLMind The Firebird
 
Working with Large Firebird databases
Working with Large Firebird databasesWorking with Large Firebird databases
Working with Large Firebird databasesMind The Firebird
 
How Firebird transactions work
How Firebird transactions workHow Firebird transactions work
How Firebird transactions workMind The Firebird
 
Understanding Numbers in Firebird SQL
Understanding Numbers in Firebird SQLUnderstanding Numbers in Firebird SQL
Understanding Numbers in Firebird SQLMind The Firebird
 
Tips for using Firebird system tables
Tips for using Firebird system tablesTips for using Firebird system tables
Tips for using Firebird system tablesMind The Firebird
 
Firebird release strategy and roadmap for 2015/2016
Firebird release strategy and roadmap for 2015/2016Firebird release strategy and roadmap for 2015/2016
Firebird release strategy and roadmap for 2015/2016Mind The Firebird
 
New SQL Features in Firebird 3, by Vlad Khorsun
New SQL Features in Firebird 3, by Vlad KhorsunNew SQL Features in Firebird 3, by Vlad Khorsun
New SQL Features in Firebird 3, by Vlad KhorsunMind The Firebird
 
Threading through InterBase, Firebird, and beyond
Threading through InterBase, Firebird, and beyondThreading through InterBase, Firebird, and beyond
Threading through InterBase, Firebird, and beyondMind The Firebird
 
Stored procedures in Firebird
Stored procedures in FirebirdStored procedures in Firebird
Stored procedures in FirebirdMind The Firebird
 
Nbackup and Backup: Internals, Usage strategy and Pitfalls, by Dmitry Kuzmenk...
Nbackup and Backup: Internals, Usage strategy and Pitfalls, by Dmitry Kuzmenk...Nbackup and Backup: Internals, Usage strategy and Pitfalls, by Dmitry Kuzmenk...
Nbackup and Backup: Internals, Usage strategy and Pitfalls, by Dmitry Kuzmenk...Mind The Firebird
 
Firebird Performance counters in details
Firebird Performance counters in detailsFirebird Performance counters in details
Firebird Performance counters in detailsMind The Firebird
 

Viewers also liked (18)

A year in the life of Firebird .Net provider
A year in the life of Firebird .Net providerA year in the life of Firebird .Net provider
A year in the life of Firebird .Net provider
 
Firebird on Linux
Firebird on LinuxFirebird on Linux
Firebird on Linux
 
Using ТРСС to study Firebird performance
Using ТРСС to study Firebird performanceUsing ТРСС to study Firebird performance
Using ТРСС to study Firebird performance
 
Orphans, Corruption, Careful Write, and Logging
Orphans, Corruption, Careful Write, and LoggingOrphans, Corruption, Careful Write, and Logging
Orphans, Corruption, Careful Write, and Logging
 
Using Azure cloud and Firebird to develop applications easily
Using Azure cloud and Firebird to develop applications easilyUsing Azure cloud and Firebird to develop applications easily
Using Azure cloud and Firebird to develop applications easily
 
Creating logs for data auditing in FirebirdSQL
Creating logs for data auditing in FirebirdSQLCreating logs for data auditing in FirebirdSQL
Creating logs for data auditing in FirebirdSQL
 
Working with Large Firebird databases
Working with Large Firebird databasesWorking with Large Firebird databases
Working with Large Firebird databases
 
How Firebird transactions work
How Firebird transactions workHow Firebird transactions work
How Firebird transactions work
 
Understanding Numbers in Firebird SQL
Understanding Numbers in Firebird SQLUnderstanding Numbers in Firebird SQL
Understanding Numbers in Firebird SQL
 
Copycat presentation
Copycat presentationCopycat presentation
Copycat presentation
 
Tips for using Firebird system tables
Tips for using Firebird system tablesTips for using Firebird system tables
Tips for using Firebird system tables
 
Firebird release strategy and roadmap for 2015/2016
Firebird release strategy and roadmap for 2015/2016Firebird release strategy and roadmap for 2015/2016
Firebird release strategy and roadmap for 2015/2016
 
New SQL Features in Firebird 3, by Vlad Khorsun
New SQL Features in Firebird 3, by Vlad KhorsunNew SQL Features in Firebird 3, by Vlad Khorsun
New SQL Features in Firebird 3, by Vlad Khorsun
 
Threading through InterBase, Firebird, and beyond
Threading through InterBase, Firebird, and beyondThreading through InterBase, Firebird, and beyond
Threading through InterBase, Firebird, and beyond
 
Stored procedures in Firebird
Stored procedures in FirebirdStored procedures in Firebird
Stored procedures in Firebird
 
SuperServer in Firebird 3
SuperServer in Firebird 3SuperServer in Firebird 3
SuperServer in Firebird 3
 
Nbackup and Backup: Internals, Usage strategy and Pitfalls, by Dmitry Kuzmenk...
Nbackup and Backup: Internals, Usage strategy and Pitfalls, by Dmitry Kuzmenk...Nbackup and Backup: Internals, Usage strategy and Pitfalls, by Dmitry Kuzmenk...
Nbackup and Backup: Internals, Usage strategy and Pitfalls, by Dmitry Kuzmenk...
 
Firebird Performance counters in details
Firebird Performance counters in detailsFirebird Performance counters in details
Firebird Performance counters in details
 

Similar to Overview of RedDatabase 2.5

Introduction to firebidSQL 3.x
Introduction to firebidSQL 3.xIntroduction to firebidSQL 3.x
Introduction to firebidSQL 3.xFabio Codebue
 
Neo4j 4.1 overview
Neo4j 4.1 overviewNeo4j 4.1 overview
Neo4j 4.1 overviewNeo4j
 
ClickHouse Unleashed 2020: Our Favorite New Features for Your Analytical Appl...
ClickHouse Unleashed 2020: Our Favorite New Features for Your Analytical Appl...ClickHouse Unleashed 2020: Our Favorite New Features for Your Analytical Appl...
ClickHouse Unleashed 2020: Our Favorite New Features for Your Analytical Appl...Altinity Ltd
 
Aioug vizag oracle12c_new_features
Aioug vizag oracle12c_new_featuresAioug vizag oracle12c_new_features
Aioug vizag oracle12c_new_featuresAiougVizagChapter
 
Take your database source code and data under control
Take your database source code and data under controlTake your database source code and data under control
Take your database source code and data under controlMarcin Przepiórowski
 
Oracle Database Security For Developers
Oracle Database Security For DevelopersOracle Database Security For Developers
Oracle Database Security For DevelopersSzymon Skorupinski
 
JoTechies - Azure SQL DB
JoTechies - Azure SQL DBJoTechies - Azure SQL DB
JoTechies - Azure SQL DBJoTechies
 
Odv oracle customer_demo
Odv oracle customer_demoOdv oracle customer_demo
Odv oracle customer_demoViaggio Italia
 
Corporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiCorporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiUnmesh Baile
 
Corporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiCorporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiUnmesh Baile
 
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAsOracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAsZohar Elkayam
 
Presentation of OrientDB v2.2 - Webinar
Presentation of OrientDB v2.2 - WebinarPresentation of OrientDB v2.2 - Webinar
Presentation of OrientDB v2.2 - WebinarOrient Technologies
 
SQL/MED: Doping for PostgreSQL
SQL/MED: Doping for PostgreSQLSQL/MED: Doping for PostgreSQL
SQL/MED: Doping for PostgreSQLPeter Eisentraut
 
Boost Your Environment With XMLDB - UKOUG 2008 - Marco Gralike
Boost Your Environment With XMLDB - UKOUG 2008 - Marco GralikeBoost Your Environment With XMLDB - UKOUG 2008 - Marco Gralike
Boost Your Environment With XMLDB - UKOUG 2008 - Marco GralikeMarco Gralike
 
GLOC 2014 NEOOUG - Oracle Database 12c New Features
GLOC 2014 NEOOUG - Oracle Database 12c New FeaturesGLOC 2014 NEOOUG - Oracle Database 12c New Features
GLOC 2014 NEOOUG - Oracle Database 12c New FeaturesBiju Thomas
 
12c Database new features
12c Database new features12c Database new features
12c Database new featuresSandeep Redkar
 

Similar to Overview of RedDatabase 2.5 (20)

Introduction to firebidSQL 3.x
Introduction to firebidSQL 3.xIntroduction to firebidSQL 3.x
Introduction to firebidSQL 3.x
 
Neo4j 4.1 overview
Neo4j 4.1 overviewNeo4j 4.1 overview
Neo4j 4.1 overview
 
ClickHouse Unleashed 2020: Our Favorite New Features for Your Analytical Appl...
ClickHouse Unleashed 2020: Our Favorite New Features for Your Analytical Appl...ClickHouse Unleashed 2020: Our Favorite New Features for Your Analytical Appl...
ClickHouse Unleashed 2020: Our Favorite New Features for Your Analytical Appl...
 
Aioug vizag oracle12c_new_features
Aioug vizag oracle12c_new_featuresAioug vizag oracle12c_new_features
Aioug vizag oracle12c_new_features
 
Take your database source code and data under control
Take your database source code and data under controlTake your database source code and data under control
Take your database source code and data under control
 
Oracle Database Security For Developers
Oracle Database Security For DevelopersOracle Database Security For Developers
Oracle Database Security For Developers
 
JoTechies - Azure SQL DB
JoTechies - Azure SQL DBJoTechies - Azure SQL DB
JoTechies - Azure SQL DB
 
Odv oracle customer_demo
Odv oracle customer_demoOdv oracle customer_demo
Odv oracle customer_demo
 
Corporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiCorporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbai
 
Corporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbaiCorporate-informatica-training-in-mumbai
Corporate-informatica-training-in-mumbai
 
Sql server basics
Sql server basicsSql server basics
Sql server basics
 
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAsOracle Database Performance Tuning Advanced Features and Best Practices for DBAs
Oracle Database Performance Tuning Advanced Features and Best Practices for DBAs
 
Presentation of OrientDB v2.2 - Webinar
Presentation of OrientDB v2.2 - WebinarPresentation of OrientDB v2.2 - Webinar
Presentation of OrientDB v2.2 - Webinar
 
Oracle DBA
Oracle DBAOracle DBA
Oracle DBA
 
Rails Security
Rails SecurityRails Security
Rails Security
 
Fudcon talk.ppt
Fudcon talk.pptFudcon talk.ppt
Fudcon talk.ppt
 
SQL/MED: Doping for PostgreSQL
SQL/MED: Doping for PostgreSQLSQL/MED: Doping for PostgreSQL
SQL/MED: Doping for PostgreSQL
 
Boost Your Environment With XMLDB - UKOUG 2008 - Marco Gralike
Boost Your Environment With XMLDB - UKOUG 2008 - Marco GralikeBoost Your Environment With XMLDB - UKOUG 2008 - Marco Gralike
Boost Your Environment With XMLDB - UKOUG 2008 - Marco Gralike
 
GLOC 2014 NEOOUG - Oracle Database 12c New Features
GLOC 2014 NEOOUG - Oracle Database 12c New FeaturesGLOC 2014 NEOOUG - Oracle Database 12c New Features
GLOC 2014 NEOOUG - Oracle Database 12c New Features
 
12c Database new features
12c Database new features12c Database new features
12c Database new features
 

More from Mind The Firebird

Superchaging big production systems on Firebird: transactions, garbage, maint...
Superchaging big production systems on Firebird: transactions, garbage, maint...Superchaging big production systems on Firebird: transactions, garbage, maint...
Superchaging big production systems on Firebird: transactions, garbage, maint...Mind The Firebird
 
Continuous Database Monitoring with the Trace API
Continuous Database Monitoring with the Trace APIContinuous Database Monitoring with the Trace API
Continuous Database Monitoring with the Trace APIMind The Firebird
 
Firebird 3 Windows Functions
Firebird 3 Windows  FunctionsFirebird 3 Windows  Functions
Firebird 3 Windows FunctionsMind The Firebird
 
Firebird Conference 2011 - Introduction
Firebird Conference 2011 - IntroductionFirebird Conference 2011 - Introduction
Firebird Conference 2011 - IntroductionMind The Firebird
 
Firebird database recovery and protection for enterprises and ISV
Firebird database recovery and protection for enterprises and ISVFirebird database recovery and protection for enterprises and ISV
Firebird database recovery and protection for enterprises and ISVMind The Firebird
 
Migration from Firebird 1.5 to Firebird 2.5
Migration from Firebird 1.5 to Firebird 2.5Migration from Firebird 1.5 to Firebird 2.5
Migration from Firebird 1.5 to Firebird 2.5Mind The Firebird
 
Handling tree structures — recursive SPs, nested sets, recursive CTEs
Handling tree structures — recursive SPs, nested sets, recursive CTEsHandling tree structures — recursive SPs, nested sets, recursive CTEs
Handling tree structures — recursive SPs, nested sets, recursive CTEsMind The Firebird
 
Character Sets and Unicode in Firebird
Character Sets and Unicode in FirebirdCharacter Sets and Unicode in Firebird
Character Sets and Unicode in FirebirdMind The Firebird
 

More from Mind The Firebird (12)

Superchaging big production systems on Firebird: transactions, garbage, maint...
Superchaging big production systems on Firebird: transactions, garbage, maint...Superchaging big production systems on Firebird: transactions, garbage, maint...
Superchaging big production systems on Firebird: transactions, garbage, maint...
 
Firebird meets NoSQL
Firebird meets NoSQLFirebird meets NoSQL
Firebird meets NoSQL
 
Continuous Database Monitoring with the Trace API
Continuous Database Monitoring with the Trace APIContinuous Database Monitoring with the Trace API
Continuous Database Monitoring with the Trace API
 
Firebird 3 Windows Functions
Firebird 3 Windows  FunctionsFirebird 3 Windows  Functions
Firebird 3 Windows Functions
 
Firebird Conference 2011 - Introduction
Firebird Conference 2011 - IntroductionFirebird Conference 2011 - Introduction
Firebird Conference 2011 - Introduction
 
Firebird database recovery and protection for enterprises and ISV
Firebird database recovery and protection for enterprises and ISVFirebird database recovery and protection for enterprises and ISV
Firebird database recovery and protection for enterprises and ISV
 
Migration from Firebird 1.5 to Firebird 2.5
Migration from Firebird 1.5 to Firebird 2.5Migration from Firebird 1.5 to Firebird 2.5
Migration from Firebird 1.5 to Firebird 2.5
 
A Bird and the Web
A Bird and the WebA Bird and the Web
A Bird and the Web
 
Handling tree structures — recursive SPs, nested sets, recursive CTEs
Handling tree structures — recursive SPs, nested sets, recursive CTEsHandling tree structures — recursive SPs, nested sets, recursive CTEs
Handling tree structures — recursive SPs, nested sets, recursive CTEs
 
Measuring Firebird Disk I/O
Measuring Firebird Disk I/OMeasuring Firebird Disk I/O
Measuring Firebird Disk I/O
 
Firebird and RAID
Firebird and RAIDFirebird and RAID
Firebird and RAID
 
Character Sets and Unicode in Firebird
Character Sets and Unicode in FirebirdCharacter Sets and Unicode in Firebird
Character Sets and Unicode in Firebird
 

Recently uploaded

Microsoft Dynamics 365 IA - Copilot/ Fabric
Microsoft Dynamics 365 IA - Copilot/ FabricMicrosoft Dynamics 365 IA - Copilot/ Fabric
Microsoft Dynamics 365 IA - Copilot/ FabricJuan Fabian
 
Open Sprintera (Where Open Source Sparks a Sprint of Possibilities)
Open Sprintera (Where Open Source Sparks a Sprint of Possibilities)Open Sprintera (Where Open Source Sparks a Sprint of Possibilities)
Open Sprintera (Where Open Source Sparks a Sprint of Possibilities)GDSCNiT
 
App Builder - Hierarchical Data Apps.pptx
App Builder - Hierarchical Data Apps.pptxApp Builder - Hierarchical Data Apps.pptx
App Builder - Hierarchical Data Apps.pptxPoojitha B
 
India's_Generative_AI_Startup_Landscape_Report_2023_Inc42 (1).pdf
India's_Generative_AI_Startup_Landscape_Report_2023_Inc42 (1).pdfIndia's_Generative_AI_Startup_Landscape_Report_2023_Inc42 (1).pdf
India's_Generative_AI_Startup_Landscape_Report_2023_Inc42 (1).pdfgranitesrijan
 
Self scaling Multi cloud nomad workloads
Self scaling Multi cloud nomad workloadsSelf scaling Multi cloud nomad workloads
Self scaling Multi cloud nomad workloadsBram Vogelaar
 
unit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdfunit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdfStephenTec
 
unit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdfunit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdfStephenTec
 
100 TOOLS TO MEASURE AND ANALYSE YOUR DIGITAL MARKETING EFFORTS
100 TOOLS TO MEASURE AND ANALYSE YOUR DIGITAL MARKETING EFFORTS100 TOOLS TO MEASURE AND ANALYSE YOUR DIGITAL MARKETING EFFORTS
100 TOOLS TO MEASURE AND ANALYSE YOUR DIGITAL MARKETING EFFORTSi-engage
 
Microsoft 365 De Security pdf
Microsoft 365 De Security pdfMicrosoft 365 De Security pdf
Microsoft 365 De Security pdfMarkus Moeller
 
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdfunit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdfStephenTec
 
SATToSE_2023_Presentation_slideshare.pdf
SATToSE_2023_Presentation_slideshare.pdfSATToSE_2023_Presentation_slideshare.pdf
SATToSE_2023_Presentation_slideshare.pdfnatarajan8993
 
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdfunit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdfStephenTec
 
BotSE2022-Natarajan.pdf
BotSE2022-Natarajan.pdfBotSE2022-Natarajan.pdf
BotSE2022-Natarajan.pdfnatarajan8993
 
Manual de la Mezcladora SoundCraft Notepad -12Fx
Manual de la Mezcladora SoundCraft Notepad -12FxManual de la Mezcladora SoundCraft Notepad -12Fx
Manual de la Mezcladora SoundCraft Notepad -12Fxjavierdavidvelasco17
 
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdfEnabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdfJohn Archer
 
owasp top 10 security risk categories and CWE
owasp top 10 security risk categories and CWEowasp top 10 security risk categories and CWE
owasp top 10 security risk categories and CWEArun Voleti
 
Get Your Hands Off the Teams Work.pdf
Get Your Hands Off the Teams Work.pdfGet Your Hands Off the Teams Work.pdf
Get Your Hands Off the Teams Work.pdfAngela Johnson
 
Slide Deck - Milestone 9 alx mils .pptx
Slide Deck  - Milestone 9 alx mils .pptxSlide Deck  - Milestone 9 alx mils .pptx
Slide Deck - Milestone 9 alx mils .pptxYassineBissaoui1
 
unit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdfunit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdfStephenTec
 
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...confluent
 

Recently uploaded (20)

Microsoft Dynamics 365 IA - Copilot/ Fabric
Microsoft Dynamics 365 IA - Copilot/ FabricMicrosoft Dynamics 365 IA - Copilot/ Fabric
Microsoft Dynamics 365 IA - Copilot/ Fabric
 
Open Sprintera (Where Open Source Sparks a Sprint of Possibilities)
Open Sprintera (Where Open Source Sparks a Sprint of Possibilities)Open Sprintera (Where Open Source Sparks a Sprint of Possibilities)
Open Sprintera (Where Open Source Sparks a Sprint of Possibilities)
 
App Builder - Hierarchical Data Apps.pptx
App Builder - Hierarchical Data Apps.pptxApp Builder - Hierarchical Data Apps.pptx
App Builder - Hierarchical Data Apps.pptx
 
India's_Generative_AI_Startup_Landscape_Report_2023_Inc42 (1).pdf
India's_Generative_AI_Startup_Landscape_Report_2023_Inc42 (1).pdfIndia's_Generative_AI_Startup_Landscape_Report_2023_Inc42 (1).pdf
India's_Generative_AI_Startup_Landscape_Report_2023_Inc42 (1).pdf
 
Self scaling Multi cloud nomad workloads
Self scaling Multi cloud nomad workloadsSelf scaling Multi cloud nomad workloads
Self scaling Multi cloud nomad workloads
 
unit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdfunit I lecture 3 - Software Process Models.pdf
unit I lecture 3 - Software Process Models.pdf
 
unit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdfunit I lecture 2 - Software Engineering Ethics - Software Process.pdf
unit I lecture 2 - Software Engineering Ethics - Software Process.pdf
 
100 TOOLS TO MEASURE AND ANALYSE YOUR DIGITAL MARKETING EFFORTS
100 TOOLS TO MEASURE AND ANALYSE YOUR DIGITAL MARKETING EFFORTS100 TOOLS TO MEASURE AND ANALYSE YOUR DIGITAL MARKETING EFFORTS
100 TOOLS TO MEASURE AND ANALYSE YOUR DIGITAL MARKETING EFFORTS
 
Microsoft 365 De Security pdf
Microsoft 365 De Security pdfMicrosoft 365 De Security pdf
Microsoft 365 De Security pdf
 
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdfunit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
unit I lecture 4 - AGILE DEVELOPMENT AND PLAN-DRIVEN.pdf
 
SATToSE_2023_Presentation_slideshare.pdf
SATToSE_2023_Presentation_slideshare.pdfSATToSE_2023_Presentation_slideshare.pdf
SATToSE_2023_Presentation_slideshare.pdf
 
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdfunit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
unit 1 lecture 1 - Introduction - Software Engineering Myths.pdf
 
BotSE2022-Natarajan.pdf
BotSE2022-Natarajan.pdfBotSE2022-Natarajan.pdf
BotSE2022-Natarajan.pdf
 
Manual de la Mezcladora SoundCraft Notepad -12Fx
Manual de la Mezcladora SoundCraft Notepad -12FxManual de la Mezcladora SoundCraft Notepad -12Fx
Manual de la Mezcladora SoundCraft Notepad -12Fx
 
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdfEnabling Enterprise-wide OT Data access  with Matrikon Data Broker.pdf
Enabling Enterprise-wide OT Data access with Matrikon Data Broker.pdf
 
owasp top 10 security risk categories and CWE
owasp top 10 security risk categories and CWEowasp top 10 security risk categories and CWE
owasp top 10 security risk categories and CWE
 
Get Your Hands Off the Teams Work.pdf
Get Your Hands Off the Teams Work.pdfGet Your Hands Off the Teams Work.pdf
Get Your Hands Off the Teams Work.pdf
 
Slide Deck - Milestone 9 alx mils .pptx
Slide Deck  - Milestone 9 alx mils .pptxSlide Deck  - Milestone 9 alx mils .pptx
Slide Deck - Milestone 9 alx mils .pptx
 
unit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdfunit I lecture 5 - Software Development Life Cycle.pdf
unit I lecture 5 - Software Development Life Cycle.pdf
 
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
Industry 4.0: Building the Unified Namespace with Confluent, HiveMQ and Spark...
 

Overview of RedDatabase 2.5

  • 1. Overview of Red Database 2.5 Roman Simakov, director of system development department RED SOFT CORPORATION
  • 2. About company • Red Soft Corporation was founded in 2006 • All solutions based on Open Source code • The main product is Red Database 2
  • 3. Development process (schema) 3 Firebird repository Red Soft repository merged commits conflict commits resolved commits Developer Firebird Developer Developer direct commits local commits
  • 4. QA process 4 Repository server Jenkins server Snapshots Release Candidates Releases Developer Test manager Commit changes Pull changes and run build jobs View test result Publish builds
  • 5. Security features 5 • Cryptographic plugin • Multi-factor authentication • Cumulative roles • DML access control • DDL access control • Service access control • Record filtering Functional features • Java Stored Procedures • Full Text Search • OpenLDAP integration • StandBy cluster (engine-level replication)
  • 6. Cryptographic plugin • It's a key feature used in other features to perform cryptographic operations. • It allows users to use necessary cryptographic methods required in different countries by using related plugins. • For Russia CryptoPro library and Windows CryptoAPI are supported. 6
  • 7. Multi-factor authentication • It allows user to provide several factors to be authenticated: OS context, password, certificate, etc. • Access to database is defined by login policy. It says what factors user must provide for authentication. • While authentication all authentication factors are transferred in encoded form. • After authentication both client and server have session key for exchanging private messages, for example new password when user wants to change it. 7
  • 8. Login policy properties Parameter name Description AUTH_FACTORS Example: (WINDOWS_NTLM PASSWORD)|(CERT_X509 PASSWORD) PSWD_NEED_CHAR The minimum number of characters in the password PSWD_NEED_DIGIT The minimum number of digits in the password PSWD_NEED_DIFF_CASE Need to use different case of characters in the password PSWD_MIN_LEN The minimum password length PSWD_VALID_DAYS The password validation interval in days PSWD_UNIQUE_COUNT The minimum number of the last unique passwords MAX_FAILED_COUNT The maximum number of failed attempt of authentication MAX_SESSIONS The maximum number of user sessions to database server MAX_IDLE_TIME The maximum idle time interval to user disconnecting 8
  • 9. Login policies DDL commands to control policies CREATE POLICY <policy_name> AS [param = value [, param = value]]; DROP POLICY <policy_name>; ALTER POLICY <policy_name> AS [param = value [, param = value]]; To grant policy to user use GRANT POLICY <policy_name> TO <user_name>; To revoke policy from user just grant DEFAULT policy to him GRANT POLICY “DEFAULT” TO <user_name>; 9
  • 10. Cumulative roles You can grant role to role except circle references GRANT ROLE1 TO ROLE2; REVOKE ROLE1 FROM ROLE2; • if user doesn't specify a role he gets permissions of all roles granted to him; • if user specifies a role he takes privileges of this role only. 10
  • 11. DML access control Extended permissions for generators/sequences GRANT SELECT | ALTER ON GENERATOR <generator> TO {<user> | <role>} [WITH GRANT OPTION]; REVOKE SELECT | ALTER ON GENERATOR <generator> FROM {<user> | <role>}; REVOKE GRANT OPTION FOR SET | GET ON GENERATOR <generator> FROM {<user> | <role>}; Extended permissions for table columns GRANT SELECT | INSERT | UPDATE {( column [, ... ] )} ON [TABLE] <table> TO {<user> | <role>} [WITH GRANT OPTION] REVOKE SELECT | INSERT | UPDATE {( column [, ... ] )} ON [TABLE] <table> FROM {<user> | <role>} REVOKE GRANT OPTION FOR SELECT | INSERT | UPDATE {( column [, ... ] )} ON [TABLE] <table> FROM {<user> | <role>} 11
  • 12. DDL access control (now in Firebird 3 too) Extended permissions for creating objects of database GRANT CREATE OBJECT TO {<USER>|<ROLE>} [WITH GRANT OPTION]; REVOKE CREATE OBJECT FROM {<USER>|<ROLE>}; Extended permissions for altering/droping objects of database GRANT ALTER|DROP [ANY] OBJECT TO {<USER>|<ROLE>} [WITH GRANT OPTION]; REVOKE ALTER|DROP [ANY] OBJECT FROM {<USER>|<ROLE>}; Where OBJECT can be: TABLE, TRIGGER, PROCEDURE, VIEW, DOMAIN, ROLE, GENERATOR, SEQUENCE, EXCEPTION, SHADOW, FUNCTION, INDEX, POLICY 12
  • 13. Service access control It's able to grant permissions to start some services (GBAK, GFIX, GSTAT, GSEC) GRANT EXECUTE ON SERVICE <SERVICE_NAME> TO {<USER>|<ROLE>} REVOKE EXECUTE ON SERVICE <SERVICE_NAME> FROM {<USER>|<ROLE>} • Permissions can be granted to users or global roles stored in security2.fdb. • Permissions can be granted by SYSDBA or by user with SECADMIN global role. 13
  • 14. Record filtering • Based on special SELECT triggers. • It allows user to skip the records if the given condition is false. • It allows user to clear some fields of records if the given condition is false. • It's used to filter system catalog to prevent user without any permissions on database object even to know about its existence. 14
  • 15. Record filter syntax User can declare filters in CREATE TABLE CREATE TABLE <table_name> [EXTERNAL [FILE] "<filespec>"] (<col_def> [, <col_def> | <tconstraint> ...], [COLFILTER <col_name> (<condition>), ...]) [, RECFILTER (<condition>)] To manage filters use ALTER TABLE ALTER TABLE table SET RECFILTER (<condition>); ALTER TABLE table DROP RECFILTER; ALTER TABLE table SET COLFILTER <col_name> (<condition>); ALTER TABLE table DROP COLFILTER <col_name>; 15
  • 16. Java Stored Procedures • It's possible to develop both user defined procedures and user defined functions • Portable code on widely used programing language • It's possible to re-use a lot of libraries • Java SP can return result set which allow them to be used as data source. • Can be used to exchange data with other databases. 16
  • 17. Full Text Search • Based on high performance cross-platform engine lucene (https://lucene.apache.org/) • Can perform search by several tables and fields • Can search in the most widely used file formats: rtf, doc, open office, pdf, etc. 17
  • 18. Integration with OpenLDAP Administrator OpenLDAP Server 18
  • 19. Optimization work with Storages SAS,SSD,... fast expensive HDD slow cheap Active DB part Archive DB part 19
  • 20. StandBy cluster (with sync replication) Master +pacemaker agent Slave +pacemaker agent 20 Record level changes acync sent and wait applying before transaction commit HA cluster under Pacemaker* * More about pacemaker at http://clusterlabs.org
  • 21. Automated Information System of Federal Service for Officers of Justice of Russia • AIS is installed and work in 85 regional departments and in the main office of FSOJ of Russia • Total amount of Red Database installations are about 2720, i.e. every city of Russia has one or several Red Database servers • AIS handles more than 10^9 documents per year • AIS works in 24/7 mode • Some databases more than 1TB and a lot of data goes to archived set of database files • 100x of concurrent connections • 100 000x transactions per hour 21
  • 22. Regional medical information system • Partner is SmartDeltaSystems Ltd. (http://www.sdsys.ru/) • Migration from Firebird because of they need to have certified solution and support • Work on CentOS and Windows • ~200 installations • Size of databases up to 12 GB • Central database size is about 50 GB • 1000x concurrent connections 22
  • 23. Automated server of radiomonitoring of Russia • The main database is ~700 GB • Regional - 100x GB • Increased by 10x GB per year • 600 000 transactions per day • 100x concurrent connections • OpenLDAP authentication 23
  • 24. Awards • «The best project of the state sector – 2011» (http://www.raspo.ru/content/28.html) • AIS FSOJ of Russia was endorsed by Prime Minister of Russia in 2014 (http://government.ru/news/10513) 24
  • 25. Some words about Red Database 2.6 • Direction to “state secret” security level • Mandatory access control based on SELinux integration • Full database encryption • Column data encryption by user key • Traffic and backup files encryption • Still based on Firebird 2.5 25
  • 26. SELinux libselinux Policies SELinux plugin packages MAC plugins interface Database objects initial contexts file Read during database creation DDL DML Red Database Users contexts security2.fdb Database Objects contexts
  • 27. user_a (rdb_user_u:rdb_user_r:rdb_user_t:s1) DB.fdb (system_u:object_r:rdb_database_t:s0) A (system_u:object_r:rdb_table_t:s0) select * from A 0 records filtered DATA (system_u:object_r:rdb_column_t:s0) MAC$LABEL foo system_u:object_r:rdb_record_t:s0 bar system_u:object_r:rdb_record_t:s1 select * from A 1 record filtered user_b (rdb_user_u:rdb_user_r:rdb_user_t:s0)
  • 28. Database Encryption 28 Key management CREATE KEY <key name> <algorithm id> GRANT KEY <key name> TO <user name> REVOKE KEY <key name> FROM <user name> DROP KEY <key name> Full database encryption isql -mf -certificate <cert alias> [-en(crypt) <key name>] SQL> CREATE DATABASE <db name>; Column database encryption isql -mf -certificate <cert alias> SQL> CREATE TABLE <table name> (<column def> [, ENCRYPT <column name> USING <key name>]); SQL> ALTER TABLE <table name> ENCRYPT <column name> USING <key name>; SQL> ALTER TABLE <table name> DECRYPT <column name>; Create an encrypted backup gbak [-en(crypt) <key name>]
  • 29. Some big goals of Red Database 3.0 • Merge with Firebird 3.0 • Load balancing cluster • Parallel backup/restore • GUI tool which support all Red Database features • Support of OpenGIS specification • Tools for migration from other DBMSs
  • 30. Thanks! We are pleased to invite you to test Red Database! visit: www.red-soft.biz ask: rdb.support@red-soft.biz roman.simakov@red-soft.biz

Editor's Notes

  1. Добрый день, Меня зовут Вадим Щепинов, я представляю здесь компанию РЕДСОФТ, работающую на рынке в концепции ПО с открытым кодом. Тема мой презентации как ПО с открытым кодом может помочь решить задачи защиты информационных систем, которые определены Европейской программой по защите критической инфраструктуры как один из ее важнейших элементов.
  2. СУБД один из ключевых элементов безопасности (защиты) информационной системы потому что База данных содержит всю информацию в информационной системе. Недекларированные возможности в СУБД сводят на нет работу последующих слоев защиты Присутствие в Базе данных как всех самих данных, так и связей между ними, дает возможность средствам защиты информации (СЗИ) СУБД классифицировать структуры данных для их защиты