For information on... | See... |
---|---|
Creating trusted users and proxy users | Working with Middle-Tier Application Users. |
Setting up administrators to manage row level security constraints | Working with Security Constraint Administrative Privileges. |
For information on... | See... |
---|---|
Creating trusted users and proxy users | Working with Middle-Tier Application Users. |
Setting up administrators to manage row level security constraints | Working with Security Constraint Administrative Privileges. |