Building a Database Access Structure

In this manual, we group within the concept of database access, the objects that are used to let database users carry out their jobs while preserving the privacy and integrity of the information within the database.

Depending on the target DBMS, the setting up of a secure database environment implies the following tasks:


Reverse Engineering

During reverse engineering by script, the permission and privilege grant orders are reverse engineered only if the user, group, or role already exist in the model or, in the case of a new model, if the user, group, or role creation orders are in the same script.

These restrictions do not apply to reverse engineering from a live database connection.