Copyright © TIBCO Software Inc. All Rights Reserved
Copyright © TIBCO Software Inc. All Rights Reserved


Chapter 6 Managing Permissions to Objects : Task D: Logging Accesses to a Table

Task D: Logging Accesses to a Table
By default, user accesses are not logged for new table definitions (that is, Log Accesses=N). However, the owner of an object and the owner’s security administrator can specify whether or not to log user accesses to non-dictionary (MetaStor) tables. All user accesses (READ and UPDATE) are then logged.
*l
When the Log Accesses field is set to Y, commit levels could be reached on large tables. Set this field to Y with caution.
Overriding Values
In the following circumstances, supplied values for the Log_Accesses field are overridden:
Required Steps
To modify the value for logging user accesses, complete the following steps:
1.
From within the Security Manager, access the Specify Protection for Table screen (shown in the illustration below) for the appropriate table.
2.
To turn logging off, type N.
Specify Protection Screen

 
-----------------------------------------------------------------------------
SPECIFY PROTECTION FOR TABLE: DEPARTMENTS
-----------------------------------------------------------------------------
Owned by:USR50 Smith, Joan Classification: 1
Log Accesses: N
Name Access Modes Allowed
(USERID | GROUP) READ INS REPL DEL DEF_VIEW DEF_PRM MOD_DFN VIEW_DEFN CTRL
---------------- - - - - - - - - -
USR10 Y N N N N N N Y N
PFKEYS: 1=HELP 4=OBJECTSETS 9=GROUPS 21=VIEW 6=USERIDS 3=SAVE 12=CANCEL

 
See Also
TIBCO Object Service Broker Managing Deployment about promotions.

Copyright © TIBCO Software Inc. All Rights Reserved
Copyright © TIBCO Software Inc. All Rights Reserved