|
roles wont work. The tables in the different
schemas all have the same names. The application is not coded to
'schemaA.table'. Its just set to the table.
roles plus setting the schema is possible to be
'safe' with security. I like that idea.
|
Title: RE: upgrade to AIX 5
- security without using different usernames Ryan
- RE: security without using different usernames Goulet, Dick
- Re: security without using different usernames Tanel Poder
- Re: security without using different usernames Ryan
- Re: security without using different usernames Ryan
- Re: security without using different usernames JApplewhite
- Re: security without using different usernames AK
- RE: security without using different usernames Pardee, Roy E
- Re: security without using different usernames JApplewhite
- RE: security without using different usernames Rudy Zung
- Re: security without using different usernames Ryan
- Re: security without using different usernames Ryan
- Re: security without using different usernames Ryan
- Re: security without using different usernames Mark Richard
- RE: security without using different usernames Mark Brooks
- Re: RE: security without using different usernames rgaffuri
- Re: security without using different usernames Pete Finnigan
- Re: security without using different usernames Don Yu
- Re: security without using different usernames Arup Nanda
- Re: security without using different usernames Don Yu
