This section describes the strategies that an administrator can use to control user access.
- Overview of Establishing Users
- Types of Users
- Assessing Database User Needs
- Best Practices for Creating Users
- Creating User Accounts
- Creating User Profiles
- Working with Database Users
- Creating Temporary Passwords for First Login
- Using Roles to Manage User Privileges
- Granting Privileges Directly to Users
- Setting Up Compute Cluster Roles, Compute Profiles, and Compute Groups and Allowing Users Access