This resource is no longer available
In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system. You’ll see why this is so important, what methods exist to communicate the application user information to the database security system, and how to use this information to implement granular access control. You’ll also read some of the broader issues pertaining to the user directories and identity management.