Fine-grained access control

CIS users can employ the features of FGAC because access rules can be bound to columns on proxy tables.

When queries against proxy tables are processed, the access rule is added to the query tree during query normalization, thus making its existence transparent to downstream query processing. Therefore, CIS users can forward additional predicates to remote servers to restrict the amount of data transferred, according to the expression defined by the access rule.

CIS can function as an FGAC hub to the entire enterprise through the use of access rules bound to columns on proxy tables.