Examples of Revoking User Security Labels
The following three statements create three security label
components called level, compartments, and groups respectively:
CREATE SECURITY LABEL COMPONENT
level ARRAY ['TS','S','C','U'];
CREATE SECURITY LABEL COMPONENT
compartments SET {'A','B','C','D'};
CREATE SECURITY LABEL COMPONENT
groups TREE ('G1' ROOT,
'G2' UNDER ROOT,
'G3' UNDER ROOT);
The following statement creates a security policy called secPolicy based
on the three components above:
CREATE SECURITY POLICY secPolicy COMPONENTS
level, compartments, groups;
The following statement creates a security label called secLabel1:
CREATE SECURITY LABEL secPolicy.secLabel1
COMPONENT level 'S',
COMPONENT compartments 'A', 'B',
COMPONENT groups 'G2';
The following statement grants this security label for
read access to user sam:
GRANT SECURITY LABEL secPolicy.secLabel1
TO sam FOR READ ACCESS;
The following statement revokes the security label for
read access from user sam.
REVOKE SECURITY LABEL secPolicy.secLabel1
FROM sam FOR READ ACCESS;
When the REVOKE SECURITY LABEL statement successfully cancels a security label that was held by a user, the database server updates the sysseclabelauth table of the system catalog to remove the user from the list of those who hold that security label.