Security Features
Setting up users, roles, privileges and related considerations
Setting up users, roles, privileges and related considerations
Security features - users, roles and privileges. Policies and procedures
Adding, viewing and removing users
Allowing access to people outside the organisation
Policies and further information
Organising users into groups for better management
The different types of privilege and how they can be assigned
Viewing, querying and reporting on log data
Viewing usage statistics relating to users, tables and views
Options relevant to storing commerically sensitive or personal data
Shows which users are viewing data from this table
Assigning table privileges