Data Integration and Composite Business Services, Part 3: Build a multi-tenant data tier with access control and security

This article is the third in this series and explores how the capabilities of IBM® DB2® address the issues of data architecture and data security in a Software as a Service (SaaS) implementation. The primary concern of a SaaS consumer is data security. The primary concern for a SaaS provider is a data architecture that provides cost effective data administration and maintenance while addressing the service consumer's concern at the same time. DB2 9 provides XML storage capabilities that simplify the configurability and extensibility of the data. DB2 9 also provides row-level security authorization. DB2 V8 and later provides partitioning and backup technologies that address scalability and maintenance concerns. In this article, you'll see how these DB2 features can be exploited to build a multi-tenant data architecture. This data architecture addresses the primary concerns of both SaaS consumers and providers.

Mary Taylor (marytaylor@us.ibm.com), Consulting IT Specialist, IBM

Author Photo: Mary TaylorMary is an IT Specialist in the Strategic Technology Architecture and Incubation team in Software Group. She's been in IBM for over 20 years. She's currently working in the SOA area, focusing on how to compose Composite Business Services (CBS) in a Software as a Service (SaaS) environment.



Chang Jie Guo (guocj@cn.ibm.com), Research Staff Member, Research Scientist, IBM

Author Photo: Chang Jie GuoChang Jie Guo is a research staff member working on next generation service within IBM China Research Lab in Beijing, China. In recent years, he has focused on some key technologies in the Software as a Service (SaaS) area, including massive multi-tenancy, agile business process management (BPM), and Web 2.0.



13 December 2007

Also available in Russian

Introduction

There are varying degrees of data isolation for a SaaS application that range from an isolated environment to a totally shared environment. Implementations along this spectrum include:

  • Totally isolated: Separate databases per tenant
  • Partially shared: Shared database, separate schema
  • Totally shared: Same database, same schema
Figure 1. Isolated vs. shared data environments
Isolated vs. shared data environments

Figure 1 compares the spectrum of isolation options in terms of ease of configurability.

  • On the left, you see an isolated environment called E1. Each tenant has their own database. E1 offers the most flexibility, in terms of configuration, as the tables are designed with custom columns to support the single tenant.
  • In the middle, you see a shared database with separate schemas, called E2. E2 offers a lesser degree of data isolation than E1. E2 offers the same ease of configurability as E1 by using custom columns.
  • On the right, you see a shared schema environment called E3. This approach has typically been viewed as the most difficult to configure. It requires the use of either name/value pair columns or preallocated fields to satisfy unique tenant requirements.

This article focuses on the third implementation, a shared database and shared schema in which a given database table can include records from multiple tenants stored in any order. In this approach a tenant ID column is used in every table, to associate each row with the appropriate tenant. This article discusses how DB2 capabilities address the extensibility, scalability, maintenance, and security concerns in this type of environment.

Overview of approach

There are a number of considerations when implementing a multi-tenant application, regardless of whether you are implementing in an isolated or shared environment. Security, scalability and performance, and maintenance and extensibility are all primary concerns of both the SaaS provider and subscriber.

  1. Data security

    Data security refers to the manner in which you ensure that each tenant only has access to their own data. In an isolated environment, each tenant has their own database, and tenant access is administered at the database level. But as you move toward a shared environment, where multiple tenant's data resides in either the same database or the same tables, then you need to consider additional security mechanisms, such as row level access to data or tenant views on the data. This article discusses the row-level access control that DB2 provides.

  2. Scalability and performance

    In multi-tenant scenarios, the shared database architecture design should be scaled up and out in a cost-effective manner. As the number of tenants increase incrementally, the system performance should remain constant. Furthermore, the architecture should provide acceptable isolation capabilities to prevent performance, availability, and management interference among tenants. This article describes some thoughts on this aspect by leveraging some of DB2 9's new features.

  3. Maintenance

    Shared infrastructure also introduces maintenance issues, especially regarding the tenant-oriented backup and restore. The traditional DBMS-level support only focuses on some aspects of this capability, such as database and table-space maintenance, and doesn't consider the new dimension of tenant. This article addresses this topic and gives a practical approach.

  4. Extensibility

    The fourth topic to be covered in this article is database extensibility in a shared environment. One of the benefits of implementing an isolated data tier, or even a shared data tier with separate schema, is that database changes for one tenant can be made directly to the database tables without consideration of how those changes impact other tenants. The perceived drawback to implementing a shared schema data tier is the complexity of implementing tenant data customization. What is described in this article is how the use of DB2 9's pureXML simplifies this configurability so that its ease of use is comparable to the use of custom columns in an isolated data tier.

1. Data security

In a multi-tenant context, the security isolation mechanism is very important in preventing the data of one tenant from being accessed illegally by other tenants. Considering the shared schema or tables pattern, there are generally two kinds of access control isolation approaches implemented from the application and the DBMS level respectively.

1.1 Application-level data access control isolation

When one tenant tries to access shared tables, a common database account is delegated to handle this database access request. The delegated account is shared by all customers of the tenant and owns the privileges to access all data for a particular tenant in the shared tables. The delegated account is unique among the different tenants. A sub-clause like "where tenant_id = xyz" needs to be inserted into the SQL statement, to filter out data records not belonging to the current tenant. For example, for an application query such as Select name, address, phone from customerData, the query would need to be re-written as Select name, address, phone from customerData where tenant_id='xyz'.

1.1.1 Limitations of application-level data access control for multi-tenancy

Although easy to implement, application-level access control has some potential security risks. For example, SQL injection, which is a technique that exploits a security vulnerability occurring in the database layer of an application, may occur when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. In the multi-tenant context, a well-designed user input may bypass the sub-clause used to filter out other tenants' data. A typical example is as follows:

Original SQL statement:

SELECT * FROM SALES_ORDER WHERE TENANTID = 'xyz' AND SOID = '" + Order_Id + "'

If the Order_Id variable is crafted in a specific way by a malicious user, the SQL statement may do more than the code author intended. For example, setting the Order_Id variable as:

'123' or '0'='0'

Then, the new SQL statement becomes:

SELECT * FROM SALES_ORDER WHERE TENANTID = 'xyz' AND SOID = '123' or '0'='0'

Obviously, in this case, all tenants' orders residing in the shared table will be accessed illegally.

1.2 DBMS-level access control isolation through LBAC

Label-Based Access Control (LBAC) is a new security feature provided by DB2 9. It lets you decide exactly who has read and write access to individual rows and individual columns, and thus greatly increases the control you have over who can access your data. LBAC controls access to table objects through the use of security labels and security policies. Security labels identify criteria that are used to decide who should have access to particular pieces of data in the database. Security labels can be associated to specific rows and columns in the database, and are granted to users to allow them to access that data. Security policies describe the criteria that is used to decide who has access to what data. Users attempting to access an object must have its security label granted to them. When there's a match, access is permitted; without a match, access is denied.

Figure 2. Object relationships of LBAC
Object relationships of LBAC

Figure 2 shows the basic object relationship in LBAC. There are three types of security labels which are associated and granted to three different database objects respectively - row, column, and user. A security label is further composed of one or more security label components. The protected table should include a column of type DB2SECURITYLABEL that holds the security label and is used to attach the security policy to the table. Users are granted access to the appropriate security labels to access the protected table in runtime. For the details of LBAC, refer to the "DB2 V9 Administration Guide: Implementation" and "DB2 Label-Based Access Control: A Practical Guide" (developerWorks, May 2006).

The remainder of this section focuses on how to apply LBAC in a multi-tenant scenario to protect each tenant's data from illegal access, while preserving the flexibility of allowing multiple tenants access to data stored in the shared tables restrictively.

To avoid the potential SQL injection introduced previously, you need to set up a dedicated database account for each tenant. This means that data access requests from different tenants for those shared tables are handled using different database accounts. In this way, you can take advantage of the LBAC mechanism to guarantee the DBMS-level security access control isolation among the tenants.

Figure 3 demonstrates a basic approach to supporting a multi-tenant scenario. An LBAC rule set is a predefined set of rules that are used when comparing security labels. When the values of two security labels are being compared, one or more of the rules in the rule set are used to determine if one value blocks another. There is a single rule set provided in DB2 9 called DB2LBACRULES. Within this rule set there are 16 pre-built security label components and each has 64 independent elements. In the example below, a security policy named "MTSecurityPolicy_Sales_Order" is created for the shared table SALES_ORDER, with a set of security labels inside. Each security label includes one element selected from one of the 16 label components. The security label name is stored in the DB2SECURITYLABEL column in the SALES_ORDER table and is the mechanism that associates the tenant to their data. To guarantee tenant access control isolation, the same element shouldn't be referenced by more than one label.

When a tenant is on-boarding, the operator may simply select one unused label and grant it to the database account of the tenant. For example, in the scenario displayed in Figure 3, the following commands could have been issued by the database administrator when the TenantA, TenantB, and TenantX were on-boarded:

  • GRANT SECURITY LABEL MTSecurityPolicy_Sales.0001 to USER TenantA for all access
  • GRANT SECURITY LABEL MTSecurityPolicy_Sales.0002 to USER TenantB for read access
  • GRANT SECURITY LABEL MTSecurityPolicy_Sales.1024 to USER TenantX for delete access

When using LBAC, SQL injection never results in security issues among tenants because the database manager is controlling cross-tenant data access at the DBMS level rather than having the security controlled at the application layer.

Figure 3. A simple multi-tenant support LBAC mechanism
LBAC Mechanism

1.2.1 Limitations of DB2 LBAC for multi-tenancy

In the current version of LBAC provided in DB2 9, no more than 16 security label components can be specified for a security policy, and each security label component can contain no more than 64 elements. Therefore, if each security label uses one element to isolate each tenant, as shown in Figure 3, the maximum number of tenants that can be supported is 1024 (16*64).

To get around this limitation, you may choose more than one element as "union keys" to compose the tenant isolated security labels. Certainly, you still need to guarantee that there are not two labels owning the same set of elements. As shown in Figure 4, if each security label includes two elements, the maximum number of tenants supported reaches 523,776.

Figure 4. Tenant isolated security labels with two elements
Security labels with two elements

2. Scalability and performance

Cost effective scalability is very important for multi-tenant applications. In an ideal situation, the maximum number of tenants supported should increase in direct proportion to the increase in resources, while still keeping the performance metrics of each tenant in a predefined and acceptable level.

There are two kinds of typical approaches to scaling:

  • Scale up: (Vertical scaling) through adding more resources (such as CPU, memory, and disks I/O) to the existing machines. This is an easy-to-use and manageable approach. However, it may not provide linear scalability. As you add resources, there is some overhead in resource management that limits the scalability of single systems.
  • Scale out: (Horizontal scaling) through adding additional machines to the existing system. Compared with scale up, this approach provides a more cost-effective and smooth scalability, since it can incrementally extend the system by adding more resources to an initially low-cost hardware set. Although scale out may inevitably increase the management complexity, it can also improve the reliability and availability of the system, in some cases because of redundancy.

DB2 provides many kinds of technologies to support both scale up and scale out mechanisms effectively. For more information, refer to the IBM Redbooks® "High Availability and Scalability Guide for DB2 on Linux, UNIX, and Windows" and "DB2 Integrated Cluster Environment Deployment Guide", found in the Resources section of this article.

This section focuses on exploring how to leverage and design effective data partitioning mechanisms at both the database and table levels when implementing multi-tenant scenarios.

2.1 Database partitioning

The database partitioning feature (DPF) of DB2 9 extends the capability of DB2 in the parallel, multi-partition environment, improving the performance and scalability of very large databases. In the scale up scenario, you can create more than one database partition on the same physical machine to take advantage of the SMP architecture. While in the scale-out scenario, partitions can be created in multiple physical machines. Each partition has its own common memory, CPUs, disk controls, and disks.

The data within a database can be distributed across one or more partitions associated with the database partition groups. A distribution key is a column (or group of columns) that is used to determine the partition in which a particular row of data is stored. The distribution key value is hashed to generate the partition map index value (range from 0-4095), which maps to the database partition the record resides in.

In the multi-tenant context, there are primarily two types of database partitioning patterns: using application-based distribution keys or using tenant-based distribution keys. These represent two principles in determining how to organize and isolate tenants' data among multiple partitions, which has an impact on many important aspects of the multi-tenant applications, such as performance, scalability, and isolation.

The remainder of this section introduces these two patterns and their pros and cons to identify the scenarios in which each of these approaches would be best followed.

2.1.1 Application-based distribution key

This pattern is a traditional and typical database partitioning approach. It chooses one or more good distribution key candidates according to the application-specific domain knowledge. In this case, one tenant's data may be stored across multiple partitions simultaneously. Figure 5 shows an example of this approach.

Figure 5. Sample of application-based database Partitioning
Database partitioning

Generally, the distribution key is specified with the CREATE TABLE statement. In this sample, the column REGION of the SALES_ORDER table is selected as the distribution key through the statement DISTRIBUTED BY HASH("REGION"). By using the hash algorithm, the order records of different regions are distributed into different partitions evenly, regardless of which tenants they belong to. For each query, the central coordinator forwards the request to multiple nodes and returns the data it receives to the tenant.

The main merit of this approach is the good load balancing among multiple partitions and nodes through selecting a suitable distribution key. However, since this approach does not take the characteristics of a multi-tenant scenario into consideration, it lacks the kind of effective isolation support required amongst tenants, which has impacts in the following areas:

  • Performance isolation: If a tenant issues a large volume of high-cost (or even malicious) requests in a short period, all tenants of the shared partition group may suffer from serious performance degradation or frustration.
  • Availability isolation: Since all of the tenants' data are distributed across the whole partition group, the failure of any partition may result in service unavailability to all tenants.
  • Management isolation: It's difficult to migrate, backup, and restore data in a tenant-isolated way using this partitioning model.

Choosing a good distribution key is important for the even distribution of data across partitions and maximizing the use of collocated joins. Collocation between joining tables means having the matching rows of the joining tables on the same database partition. This avoids the database manager having to ship rows between partitions.

2.1.2 Tenant-based distribution key

This approach stores each tenant's data in a single partition. It can simply use the column TenantId as the distribution key. However, to improve flexibility, a new column called "DBPKey" has been created in the table as the distribution key and associate a tenant ID with the DBPKey. Using this approach, you needn't bind the partition of one tenant with its fixed tenant ID, and can map one tenant to any specific partition freely by assigning or changing the DBPKey value directly.

Figure 6. Sample of application-based database Partitioning
Application-based database partitioning

As illustrated in Figure 6, when a new tenant is on-boarding, the SaaS application operator allocates a fixed tenant ID and a DBPKey value mapping to a certain database partition. This metadata is stored in a repository to maintain the mapping relationship between tenants and partitions. When a data access request is received, you first retrieve the tenant's DBPKey value from the metadata repository, and attach the sub clause DBPKEY=xyz to the original SQL statement. Then the database manager can automatically route the request to the corresponding partition the tenant resides in.

As a tenant-aware (but application independent) partitioning approach, it provides better isolation support among tenants, since all data and operations of one tenant are contained in a single partition. The failure of a certain partition does not impact the service availability to tenants in other partitions. In the management aspect, it's easier to implement functions, such as tenant data migration, backup, and restore, since no cross-partition operations are needed. This distribution key selection approach also eliminates the risks associated with cross-partition joins.

Furthermore, in order to do better load balancing among partitions and optimize the overall database performance, you may design algorithms or policies to effectively migrate or distribute tenants among partitions through monitoring the load of tenants and partitions.

To sum up, using application-based distribution keys is more suitable for large enterprises that have relatively large volumes of data and heavy loads, since it can provide better parallel performance through effective load balance mechanisms across multiple partitions and machines. While for SMB tenants whose data size and transaction loads can be satisfied by a single database partition, the tenant-based distribution key is a better choice due to its more powerful isolation capability.

2.2 Table partitioning

Table partitioning provides a way of creating a table where ranges of the data in the table are stored separately. Its merits can be shown through both performance optimization and management flexibility aspects. On one hand, it can potentially boost query performance through data partition elimination. On the other hand, it also makes managing table data much easier by providing partition roll-in and roll-out capability by using attach and detach clauses on the ALTER TABLE statement. As explained in the following section, these two features are valuable in multi-tenant scenarios.

Determining the range selection criteria is one of the essential elements to table partitioning. Range selection defines the table partitioning key column, how many partitions you have in the table, the volume of data that is rolled-out, and limits to the data that the table holds. Similar to database partitioning, we can add a "TPKey" column in the shared table as the table partitioning key. Each tenant will be assigned a specific TPKey value to identify its corresponding table partition. In practice, some application-based columns can be combined with the TPKey to build a more intricate table partitioning range.

For example, as illustrated in Figure 7, the TPKey and REGION columns of the SALES_ORDER table are combined together to form the union key. For the requests of one tenant, you may retrieve its corresponding TPKey value from the metadata repository, and add it to the original SQL statement for table partition elimination. The partition elimination is the ability of the optimizer to determine that certain ranges do not need to be accessed at all for a query. This greatly improves the performance of the multi-tenant applications, since all requests from one tenant are only redirected to its dedicated table partitions. For example, a query request of tenant A only operates over table partitions PAT_0E, PAT_0N, and PAT_0S. Furthermore, by isolating different tenants' data within dedicated table partitions, you can easily (un)load and migrate a tenant's data from the shared table using DB2 9 roll-in and roll-out features. These features allow data partitions to be easily added or removed from the table without having to take the database offline.

Figure 7. Sample of tenant-based table partitioning
Table partitioning

3. Maintenance

Per-tenant data backup and restore is a very important feature that should be provided in a multi-tenant scenario. However, in the shared schema or tables environment, it's difficult since all of the tenants' data are stored together. This section proposes a practical approach to realizing this feature based on the database and table partitioning technologies introduced before.

DB2 provides tablespace-level online incremental backup and roll-forward support in a partitioned environment. For more information, refer to "Data Recovery and High Availability Guide and Reference" found in the Resources section of this article. The following are two samples:

  • Online incremental backup of tablespace tbsp1 in database testdb:

    db2_all 'db2 BACKUP DB testdb TABLESPACE tbsp1 ONLINE INCREMENTAL TO /home/db2inst1/BACKUPS include logs'

  • Online roll-forward of tablespace tbsp1 in database testdb:

    db2_all 'db2 ROLLFORWARD DB testdb to 2007-10-31-14.21.56.245378 and stop TABLESPACE(tbsp1) online'

The idea is to store each tenant's data from multiple shared tables in a dedicated tablespace isolated from other tenants through well-designed database and table partitioning mechanisms.

Figure 8. Sample of tenant-based tablespace management
Sample of tenant-based tablespace management

As illustrated in Figure 8, by taking advantage of the tenant-based database and table partitioning approaches introduced previously, all data of one tenant is stored in a single database partition, with a dedicated table partition for each shared table it utilizes. Within the database partition, you further allocate a dedicated tablespace for the tenant to contain all of its table partitions. This results in all data of the tenant being stored in the dedicated tablespace. In this way, you can easily backup and restore one tenant's data at the tablespace level without impacting other tenants sharing the same set of tables.

4. Extensibility

Typically, when utilizing a shared database schema in a multi-tenant environment, the task of customizing a database table to add tenant-specific data can be complex. Each shared table needs to contain a column that identifies the tenant (such as a tenant ID field), and the tenant data is accessed by filtering on that column. In terms of providing tenant-specific data elements, there are a number of potential implementation strategies that are often used, such as the following:

  • User views: Views created against shared database tables that only include the data for a single tenant. Access to the views is granted to the tenant of that data. The views select the rows by tenant ID, and include the specific columns in the table that the tenant is interested in. When adding new tenant-specific columns, the views of the other tenants do not need to be recreated as long as the other tenants do not want to include the new column.
  • Preallocated columns: Creating a fixed number of additional columns in each table with a generic definition (such as varchar (x)). The content for these columns would be enforced through application logic in the user interface (for example enforcing numerics and data format) allowing each tenant to use the columns in the manner in which they see fit. This approach has several drawbacks. Since the columns exist for every row in the table, space is being consumed for those tenants that are not utilizing the additional columns. For those tenants that require a large number of custom columns, once you've used up all of the additional columns, you need to alter the table to add new columns, potentially affecting all of the tenants.
  • Extension tables: Tables that use the tenant ID as key, and store additional tenant-specific data elements through the use of a record identifier in conjunction with the tenant ID. In this scenario, the tenant ID in the original table is used to join to an extension table to pull in additional tenant specific data, data which is not contained in the base table utilized by all the tenants. This is a recommended approach over preallocated columns since only tenants who use the additional fields have them allocated.

This section focuses on a fourth implementation strategy for shared schema, namely the use of the pureXML capabilities of DB2 9. DB2 9 stores XML data in a hierarchical structure that naturally reflects the structure of XML. This structure, along with new indexing techniques, allows DB2 to efficiently manage this data and eliminate the complex and time-consuming parsing typically required for XML. The use of this approach raises the following two questions:

  • XML storage has been around for quite a while. What benefit does storage in pureXML format have over the current storage mechanisms, such as CLOB format and shredding?
  • Regarding extensibility, what is the advantage of storing data in pureXML format over storage in tradition SQL format?

4.1 pureXML vs traditional XML storage

Traditional XML storage requires storing whole XML documents in a CLOB column, or "shredding" the XML document into multiple relational tables. When XML is stored as a CLOB, the XML document is retrieved as a single object, with no ability to query based on the data contained within the XML document. pureXML™ provides query capability on all of the elements within the XML document. It also provides indexing and search capability on those elements. On the other hand, shredding XML documents into multiple tables is time consuming and difficult. The benefit of pureXML is that the data is stored in a single table column, yet you are provided the benefit of indexing and search on the individual XML elements, like you are in a shredding approach. So it is the ease of storage and access that differentiates pureXML from XML shredding.

4.2 pureXML vs SQL format

Using pureXML, the XML document is stored in a single DB2 column. Therefore, the data definition language (DDL) for the table remains constant, regardless of the format of the XML elements. In a multi-tenant shared environment, this eliminates the need for DDL changes once the table has been defined (assuming all tenant-specific data is stored in the XML column), and provides the tenant with the ability to customize their data without affecting other tenants. Of course, regardless of whether you store the data in traditional SQL columns or XML, all database changes need to be considered in conjunction with the application-level changes, to ensure that the application code and display code can accommodate the database changes.

Figure 9 illustrates how the data for two tenants in a separate schema environment would be stored in custom tables. Extending those tables with new columns could be done without affecting other tenants.

Figure 9. Data storage in an isolated environment
Data storage in an isolated environment

Utilizing DB2 9, a single table was created in a shared schema environment that had two columns: tenantid and customerprofile. The customerprofile column was defined as XML. The XSD for that column could differ by row — DB2 allows for multiple XSDs on the same XML column.

In Figure 10, you can see that Bank1's XML documents contain the element cell phone, while Bank2's doesn't. The schema for the table is the same, allowing both tenants' data to be stored in the same table. In this scenario, the same XSD was used (see Figure 11), although it doesn't have to be.

Figure 10. Utilizing pureXML data storage
Storage using pureXML
Figure 11. Customer profile XSD
Customer profile XSD

As mentioned previously, database extensions need to be considered along with the changes required to the application and display code. In this scenario, tenant data configurability is simplified through the use of an XML column to hold all tenant data, allowing for ease of data configuration. In addition, the application code changes required to implement the tenant-specific portlets were able to be simplified by utilizing the same XSD for the two tenants with optional XML elements. This allowed the use of the same Web services for both tenants.

Conclusion

This article provided techniques on how to address multi-tenant technical challenges at the data tier, by utilizing the capabilities of DB2 9. The use of LBAC was recommended, to guarantee the security of your data. LBAC uses the DBMS to enforce database security, alleviating the tenant of the threat of SQL injection.

In terms of scalability and performance, this article focused on database and tablespace partitioning. The result of analysis is that using application-based distribution keys is more suitable for large enterprises that have relatively large volumes of data and heavy loads, since it can provide better parallel performance through effective load-balance mechanisms across multiple partitions and machines. Partitioning using a tenant-based distribution key is a better choice for smaller tenants whose data size and transaction loads can be satisfied by a single database partition. This type of partitioning provides powerful isolation capability that is required in a multi-tenant shared schema environment. In terms of maintenance, in order to provide tenant-isolated maintenance, you should store each tenant's data in its own tablespace. By using this approach you can use the DB2 tablespace backup and restore capabilities and only affect a single tenant's data at a time.

And finally, regarding extensibility, by using pureXML you can isolate tenant-specific data in a single XML column in each table, providing flexibility for making changes to that data without affecting other tenants, and without requiring the use of a DBA to make DDL changes.

Resources

Learn

Get products and technologies

  • Download IBM product evaluation versions and get your hands on application development tools and middleware products from DB2, Lotus®, Rational®, Tivoli®, and WebSphere®.

Discuss

More downloads

Comments

developerWorks: Sign in

Required fields are indicated with an asterisk (*).


Need an IBM ID?
Forgot your IBM ID?


Forgot your password?
Change your password

By clicking Submit, you agree to the developerWorks terms of use.

 


The first time you sign into developerWorks, a profile is created for you. Information in your profile (your name, country/region, and company name) is displayed to the public and will accompany any content you post, unless you opt to hide your company name. You may update your IBM account at any time.

All information submitted is secure.

Choose your display name



The first time you sign in to developerWorks, a profile is created for you, so you need to choose a display name. Your display name accompanies the content you post on developerWorks.

Please choose a display name between 3-31 characters. Your display name must be unique in the developerWorks community and should not be your email address for privacy reasons.

Required fields are indicated with an asterisk (*).

(Must be between 3 – 31 characters.)

By clicking Submit, you agree to the developerWorks terms of use.

 


All information submitted is secure.

Dig deeper into Information management on developerWorks


static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Information Management, SOA and web services
ArticleID=276770
ArticleTitle=Data Integration and Composite Business Services, Part 3: Build a multi-tenant data tier with access control and security
publish-date=12132007