User Database-Level Security

This security level is used to define a user's ability to access the software database through a means other than the software application, especially through third-party database tools (e.g., InfoMaker, Microsoft Access, and Crystal Reports).

 

Using the security utility of your Database Management System (DBMS), you must set up a Login ID and password for each software user (see your DBMS documentation to assist you with this process). The Login ID and password are verified through the database engine when a connection to the database is attempted.