Contents Index Database object names and prefixes Using views for tailored security

ASA Database Administration Guide
  Managing User IDs and Permissions

Using views and procedures for extra security


For databases that require a high level of security, defining permissions directly on tables has limitations. Any permission granted to a user on a table applies to the whole table. There are many cases when users' permissions need to be shaped more precisely than on a table-by-table basis. For example:

In these cases, you can use views and stored procedures to tailor permissions to suit the needs of your organization. This section describes some of the uses of views and procedures for permission management.

For more information about how to create views, see Working with views.

For more information about view permissions, see Granting permissions on views.


Using views for tailored security
Using procedures for tailored security

Contents Index Database object names and prefixes Using views for tailored security