Database Security Model
This is read-only.
Pervasive looks into the system tables of the database the user is opening to authenticate the following:
Pervasive looks into the tables of the database the user is opening to authenticate the following:
- If the user is defined.
- If the password is correct.
- If the user is part of an authorized group.
- What rights and permission have been granted to the user for the required activity.
Then, the user is authorized to open the company, based on the above criteria.
Remarque : You assign the Database security option in the Pervasive Control Center.