Chapter 40: Securing Database Access

Chapter 40 discusses the options for configuring security settings to control who has access to which features.

The material in this chapter is organized into the following sections:

  • Exploring the Benefits of Security
  • Defining Default Security
  • Exploring the Manage Security Dialog
    • Exploring the Interface Modes
  • Exploring Privilege Sets
    • Default Privilege Sets
    • Creating Custom Privilege Sets
  • Defining Extended Privileges
    • Defining Built-In Extended Privileges
    • Using Custom Extended Privileges
  • Controlling File Access