The behavior of some commands and system procedures changes when issued in proxy databases.
View this book as PDF