Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Current »

NOTE: for any users who will be utilizing and configuring permissions within ESHA Security, the minimum Roles required to add new users and assign them to roles is membership the the following 3 roles:   :

  • Server Role 'securityadmin'
  • Database Role 'db_accessadmin'
  • Database Role 'db_securityadmin'


ESHA Security consists of the following functions, each of which are performed using a page in the Access Control Utility:

  1. Working with Users
  2. Working with Roles
  3. Working with Security Groups
  4. Configuring Settings
  5. Testing User Access
  6. Exiting ESHA Security
  • No labels