This chapter describes how to configure the database connections required to implement e-Biz Impact security.
View this book as PDF