Connection, Authentication, and Security

Topics:

This chapter describes attributes and settings needed for connection to and authentication by the RDBMS.

In any computer system, it is important to secure data from unauthorized access. Both the RDBMS and FOCUS provide security mechanisms to ensure that users access only those objects for which they have authorization.


Information Builders