Information about the tables in a data source can include the names of tables and the columns in them, table privileges, names of primary and foreign keys, information about predefined queries or stored procedures, information about indexes on tables, and statistics about tables.
基于1个网页-相关网页
In Listing 3, you see that the user EMMA has CONTROL privilege on the table TABLE1 as well as all the other available table privileges, including the ability to grant those privileges to other users.
在清单3中,可以看出用户EMMA具有表table1上的CONTROL特权,以及所有其他可用的表特权,包括将这些特权授予其他人的能力。
The permissions used to access external tables is governed by the user access privileges on the external table by IDS as well as the data file permissions managed by the operating system.
用于访问外部表的权限由IDS通过外部表上的用户访问特权治理,还受到由操作系统管理的数据文件权限的治理。
That is, IDS verifies whether the user attempting to access the table has been granted the required privileges to perform the requested operation on that table.
也就是说,IDS验证试图访问表的用户是否已经被授予在该表上执行操作所需的权限。
应用推荐