Try OpenEdge Now
skip to main content
Configuring Multi-tenancy
Managing users and domains in a multi-tenant database : Managing multi-tenant database table security for users

Managing multi-tenant database table security for users

As you work with users in the database, you can define what types of operations the users can perform on tables and fields enabled for multi-tenancy. You can also review at a glance the security settings you have established for the users.
To define security for one or more tables and fields:
1. Click Database Administration > Go to Database Administration in the OpenEdge Management console menu.
The Database Administration page appears.
2. Filter or search for, and select the required database connection.
The database connection home page appears.
3. Under Security Summary, click Edit data security. The schema appears in the list frame, and the list of tables for the database you selected appears.
4. To view or modify permissions for a table or field, select the table or field in the schema.
A list of current user permissions for the selected table or field appears in a permission panel for each of the following options. The default for each permission is an asterisk ( * ), indicating that the permission is currently in place for all users.
A user granted this permission . . .
Can . . .
Read a table or field.
Write to a table or field.
Create new records in a table. To create a new record, users must also have Can-write privileges.
Delete records from a table.
Dump database or table definitions and data with triggers disabled.
Load database or table definitions and data with triggers disabled.
5. To include hidden tables and fields in the list, click the Filter icon. The Show hidden tables and fields check box appears.
6. Select the check box to see the hidden objects, or click the Filter icon again to close the check box.
7. If you want to add to the list of users for a particular permission, click that permission panel. The list of actions to the right of the permission panel reflects the options you have regarding that permission, in addition to providing a link for you to review user data security based on the selected permission.
For example, if you click the Can-create panel, the list of actions appears.
8. Choose one:
*Click Add users to<permission>, from the Actions list. The User Selection dialog appears. Select one or more users in the list, and click OK.
*Type the name of each user you want to add. Follow these conventions:
*Separate user names by inserting a comma (not a period) between each one.
*Use an asterisk ( *) to allow a permission for all users. Remember to remove the asterisk if you do not want a permission to be available for all users.
*To allow a permission for all users except one—for example user u1— use !u1,*
*To allow a permission for only those users whose names begin with a letter or letters—for example ab—use ab*
*To allow a permission for a user of a domain, separate the user name with the domain name:
*To allow a permission for all users of a domain, put a wild card in front of the domain:
9. Repeat Step 8 for each additional permission.
10. Click Commit to save the settings.
* Reviewing user data security permissions