Once it has identified the user, the Security Facility determines if the resource is in a database secured under the SQL Security Model or the CA Datacom/DB Security Model. The Security Facility then validates the rights of the user based on the rules or permissions in the external security package or SQL security.
|
Copyright © 2014 CA.
All rights reserved.
|
|