Security

Security operation removes or changes security configuration in one or more schemas in one database connection. There are four possible options that are selected exclusively.

  • Remove security configuration option

  • Applying security configuration from a selected file on disk

  • Reuse security configuration from file on a disk

  • Copy security configuration from other schema inside connection