![]() |
Copyright © TIBCO Software Inc. All Rights Reserved |
By default, user accesses are not logged for new table definitions (that is, Log Accesses=N). However, the owner of an object and the owner’s security administrator can specify whether or not to log user accesses to non-dictionary (MetaStor) tables. All user accesses (READ and UPDATE) are then logged.
When the Log Accesses field is set to Y, commit levels could be reached on large tables. Set this field to Y with caution.In the following circumstances, supplied values for the Log_Accesses field are overridden:
• If the table is being promoted, the value for this field is determined by the Promotions facility.
• If logging is disabled, the value for this field is ignored. Refer to Chapter 8, Auditing Accesses for additional information about security logging.
1. From within the Security Manager, access the Specify Protection for Table screen (shown in the illustration below) for the appropriate table.
TIBCO Object Service Broker Managing Deployment about promotions.
![]() |
Copyright © TIBCO Software Inc. All Rights Reserved |