Powered by Zoomin Software. For more details please contactZoomin

Database Activity Monitoring User Guide

Source Type
Application Security
Data Security
Network Security
Application Performance
Product Versions
Hypervisor Installation
Document Type
Public Cloud
    Community Content Type
      Product Area
      This guide

      Introduction to SecureSphere User Rights Management

      Table of Contents
      HomeDatabase Activity Monitoring User Guide...User Rights ManagementIntroduction to SecureSphere User Rights ManagementCurrent page
      Table of Contents

      Introduction to SecureSphere User Rights Management

       Introduction to SecureSphere User Rights Management

      SecureSphere User Rights Management enables you to scan your database servers for granted user rights, display various details regarding these rights such as who granted them, who received rights, objects to which rights have been granted, and more. It then enables you to perform an organized review of these rights to determine if they are appropriate, approve or reject the granting of these rights, or assign them to another for review, and then report on this process.

      These steps help you maintain a managed workflow over the granting of rights to your database data to help maintain integrity and transparency over users that have access to sensitive data and objects.

      The following types of user rights management are available:

      • Database User Rights: User rights that pertain to database data that were discovered using a DB User Rights scan. For more information on configuring a DB User Rights scan, see Configuring a Database User Rights Scan
      Was this topic helpful?