Security

    Security operation removes or changes security configuration in one or more schemas in one database connection. There are four possible options that are selected exclusively.

    • Remove security configuration option

    • Applying security configuration from a selected file on disk

    • Reuse security configuration from file on a disk

    • Copy security configuration from other schema inside connection