Sybase login creation from PB

Sybase login creation from PB

How can I create a Sybase login from a PowerBuilder front-end application using sp_addlogin?

The normal way of executing stored procedures ? for example, declare procname for procedure ? did not work. Is there any constraint in Sybase or PowerBuilder while executing system stored procedures?

Also, is there another way to create login and users from PB front end in Sybase?

I am using PB 5.0 and Sybase 11.0.

The PowerBuilder compiler will recognize only the basic SQL syntax foreach database management system: SELECT, INSERT, UPDATE andDELETE. It will also allow the declaration of store procedures for thoseDBMSes that support them.

For the extended commands that are different on each DBMS, PowerBuilderprovides for dynamic SQL through the use of the EXECUTE IMMEDIATEfunction. There are many formats to the EXECUTE IMMEDIATE command; lookin your DBMS manual for a full description or search fordynamic SQL in the PowerBuilder on-line help.

Basically, the EXECUTE IMMEDIATE commands allow you to pass any string tothe database for execution. If you need to return a result set, youcan use SQLSA and SQLDA to describe and read your result set.

Fortunately, the type of command you want to execute does not require adynamic result set definition. You can use the Format 1 of the EXECUTEIMMEDIATE command, which, for the command you would like to execute, wouldlook something like the following (where the aX_X are arguments to afunction):

String ls_SQLls_SQL = ‘sp_adduser ‘ + as_userid + ‘ ‘ + as_password + ‘ ‘ + as_groupEXECUTE IMMEDIATE :ls_SQL USING SQLCA;

Share the Post:
data observability

Data Observability Explained

Data is the lifeblood of any successful business, as it is the driving force behind critical decision-making, insight generation, and strategic development. However, due to its intricate nature, ensuring the

Heading photo, Metadata.

What is Metadata?

What is metadata? Well, It’s an odd concept to wrap your head around. Metadata is essentially the secondary layer of data that tracks details about the “regular” data. The regular

XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved