Manage multi-tenant database table security for users
Print
- Last Updated: January 16, 2024
- 2 minute read
- OpenEdge
- Version 12.8
- Documentation
As you work with users in the database, you can define what types of operations the users can perform on tables and fields enabled for multi-tenancy. You can also review at a glance the security settings you have established for the users.
To define security for one or more tables and fields:
-
Click Database Administration > Go to Database Administration in the OpenEdge Management console menu.
The Database Administration page appears.
-
Filter or search for, and select the required database connection.
The database connection home page appears.
- Under Security Summary, click Edit data security. The schema appears in the list frame, and the list of tables for the database you selected appears.
-
To view or modify permissions for a table or field, select the table or field in the
schema.
A list of current user permissions for the selected table or field appears in a permission panel for each of the following options. The default for each permission is an asterisk ( * ), indicating that the permission is currently in place for all users.
A user granted this permission . . . Can . . . Can-read Read a table or field. Can-write Write to a table or field. Can-create Create new records in a table. To create a new record, users must also have Can-write privileges. Can-delete Delete records from a table. Can-dump Dump database or table definitions and data with triggers disabled. Can-load Load database or table definitions and data with triggers disabled. - To include hidden tables and fields in the list, click the Filter icon. The Show hidden tables and fields check box appears.
- Select the check box to see the hidden objects, or click the Filter icon again to close the check box.
-
If you want to add to the list of users for a particular permission, click that
permission panel. The list of actions to the right of the permission panel reflects the
options you have regarding that permission, in addition to providing a link for you to
review user data security based on the selected permission.
For example, if you click the Can-create panel, the list of actions appears.
-
Choose one:
- Click Add users to<permission>, from the
Actions list. The User Selection dialog
appears. Select one or more users in the list, and click
OK.
- Type the name of each user you want to add. Follow these conventions:
- Separate user names by inserting a comma (not a period) between each one.
- Use an asterisk ( *) to allow a permission for all users. Remember to remove the asterisk if you do not want a permission to be available for all users.
- To allow a permission for all users except one—for example user u1— use !u1,*
- To allow a permission for only those users whose names begin with a letter or letters—for example ab—use ab*
- To allow a permission for a user of a domain, separate the user name with the
domain
name:
user@domain - To allow a permission for all users of a domain, put a wild card in front of the
domain:
*@domain
- Click Add users to<permission>, from the
Actions list. The User Selection dialog
appears. Select one or more users in the list, and click
OK.
- Repeat Step 8 for each additional permission.
- Click Commit to save the settings.