Database Security Model

This is read-only.

Pervasive looks into the system tables of the database the user is opening to authenticate the following:

Pervasive looks into the tables of the database the user is opening to authenticate the following:

Then, the user is authorized to open the company, based on the above criteria.

Remarque : You assign the Database security option in the Pervasive Control Center.