FOCUS respects all existing RDBMS security. That is, an adapter user must be authorized, in RDBMS terms, to retrieve data or update tables. This authorization must come from the RDBMS database administrator or another authorized user.
FOCUS also provides its own security facilities. You can use them as a complement to RDBMS security. FOCUS security can enforce the following levels of restriction:
Refer to the Describing Data manual for information on DBA security.
Information Builders |